[MINUTES] Data Integrity 2025-07-11

W3C Credentials Community Group Data Integrity Call Summary - July 11, 2025

*Topics Covered:*

   - *GDC Updates:* Discussion of the Global Digital Collaboration event,
   noting the US corporate presence, concerns about centralization and
   surveillance, and lack of government representation. Longfellow ZK
   presentations were mentioned but no detailed discussion occurred.
   - *BBS Updates:* Progress on the BBS pseudonyms work, aiming for a last
   call on the base draft. Discussion of post-quantum cryptography challenges
   with ZKPs and BBS, highlighting the difficulty of integrating with
   lattice-based techniques and the need for alternative solutions or fallback
   mechanisms for post-2030. Exploration of quantum-resistant cryptography and
   key distribution was also briefly touched upon.
   - *Quantum-Safe Crypto Suites:* Review of Dine and Forkbomb's MLDDSA
   crypto suite implementation using Zen Room. Next steps include updating
   suite names, selecting public key identifiers, and addressing base encoding
   inconsistencies. The integration of common algorithms into data integrity
   specifications was also planned, pending the VCWG's return from summer
   break.
   - *Data Integrity Presentation (September):* Planning for a September
   presentation on data integrity, with ideas for a tutorial format using
   Jupyter notebooks, focusing on foundational technology and the flexibility
   of the data integrity approach to accommodate evolving cryptographic
   methods. The presentation will emphasize the ability to upgrade
   cryptographic methods without impacting the core format. Integration with
   existing tools like the credential playground was also discussed.
   - *Refactoring Data Integrity Specifications:* Discussion on refactoring
   the data integrity specifications, potentially starting with a smaller
   subset of algorithms to gauge the effort required before tackling a
   complete overhaul. The goal is to improve clarity and address repetition
   within the spec.

*Key Points:*

   - Significant challenges exist in integrating zero-knowledge proofs with
   post-quantum cryptography, potentially necessitating fallback solutions.
   Hash-based solutions or tokenization approaches are considered as potential
   backups.
   - The data integrity approach offers flexibility by allowing
   cryptographic upgrades without modifying the core credential format. This
   is a key advantage compared to other approaches.
   - The community is exploring different approaches to address the
   post-quantum cryptography challenges, including investigating SQI pairing
   techniques and developing tokenization services.
   - A September presentation on data integrity is planned, likely to
   include a practical tutorial format using Jupyter notebooks and potentially
   leveraging existing tools and resources.
   - Refactoring the data integrity specification is needed to improve
   clarity and generalizability. A phased approach, starting with a subset of
   algorithms, is suggested.
   - The "experimental" prefix for quantum-safe crypto suites will likely
   be maintained until significant uptake warrants a name change.

Text: https://meet.w3c-ccg.org/archives/w3c-ccg-data-integrity-2025-07-11.md

Video:
https://meet.w3c-ccg.org/archives/w3c-ccg-data-integrity-2025-07-11.mp4
*Data Integrity - 2025/07/11 09:53 EDT - Transcript* *Attendees*

Dave Longley, Geun-Hyung Kim, Greg Bernstein, Hiroyuki Sano, John's
Notetaker, Manu Sporny, Parth Bhatt, Phillip Long, Ted Thibodeau Jr, Will
Abramson
*Transcript*

Manu Sporny: All right, let's go ahead and get started. Welcome everyone to
the credentials community group data integrity call for Friday. This is
July 11th, 2025. we have a fairly compact agenda today. We might get
through it fairly quickly. we wanted to cover some updates from the digital
collaboration GDC which happened last week. if there are anything that
happened during that meeting that was relevant to the work that we're doing
on data integrity it would be good to cover that. I know there were some
presentations on Longfellow ZK that Google did at GDC. and kind of some of
the Greg, if you've got any updates on the BBS work, it'd be good to review
some of that.

Manu Sporny: and then we should spend a decent chunk of time talking about
how to move the quantum safe crypto suites forward. I know that Dine and
Forkbomb did a presentation on their MLDDSA cryptouite implementation that
uses the quantum safe cryptouite spec loosely. So, we need to figure out
what we need to do to kind of keep moving that forward so it's ready for
adoption by VCWG shortly. are there any other updates or changes to the
agenda? Anything else we want to cover today?

Will Abramson: This is just an add-on really. I don't usually send these
calls anymore, but one of the things is the quantum save stuff like I mean
I talk about this more,…

Will Abramson: but I think we should also talk about the refactoring, to
bring some stuff into data integrity.

Manu Sporny: Plus one to that.

Manu Sporny: We can add that to the agenda as well. go ahead, Greg.

Greg Bernstein: If there's a little time left, I'm scheduled to give a
general presentation to u the CCG in September on data integrity and
wouldn't mind some discussion of what might be best. I generally have been
doing these tutorials on this stuff and…
00:05:00

Manu Sporny: Cool. Yeah,…

Greg Bernstein: wouldn't mind some ideas of what I could do because I
wouldn't mind putting together a nice tutorial to go along with the
presentation so people can have that for a reference. So, sounds good.

Manu Sporny: absolutely. We can add that to the agenda as well. let's add
that one further up in the agenda. just so we can make sure that we cover
it. maybe Greg when you cover your BBS stuff, we'll also cover any other
items for the agenda today? All right. if not, let's get started with any
updates from GDC, the global digital collaboration. it was a very
successful event.

Manu Sporny: from what we hear, they just posted, all of the videos from
day one along with the presentation decks. this morning I got kind of a
notification of that. let me see if I can find that email. here it is.
presentations. Let's see. YouTube channel all of day one. So that is
available at this link here which will unfortunately not be saved in the
minutes. but maybe we can share it to the mailing list. so if you weren't
able to attend you can still watch all the presentations from day one. so
that's one of the things that came out of it.

Manu Sporny: the other thing that I know is that there was some
presentation on Longfellow by so that was of interest to the community.
anyone that attended I think Phil were there anything covered that's
relevant to data integrity like privacy preserving cryptography or gaps or
anything of that nature?

Phillip Long: I can go first and be brief. I think the thing that was
probably most notable was well on the one hand the US presence was
primarily by virtue of the corporations m Google and others. there wasn't
any government presence to speak of. secondly, there was a general eliding
over issues associated with centralization. no one there was no plenary
that talked about the MDL serverish side issues or anything like that that
I recall. There was discussion in a subsequent day two meeting but that was
in the educational credentials group because Kim and Carrie and I were
there and others.

Phillip Long: but I think that there was a sense that there's a strong
concern about both surveillance and tracking being reintegrated into
centralized ways of managing and dealing with DIDs. And I believe that
Christopher Allen's in the process of writing something he's going to be
post on posting on his musings thread that addresses this. will

Will Abramson: Yeah, I mean I don't have anything, it was a great event. I
don't have anything that's directly relevant to data for integrity, I don't
think. But yeah, it's a shame. I don't know if they're going to publish
also the day two stuff because I found that most interesting. I mean, day
one is good for overview of…

Will Abramson: what all the countries and in specific domains are looking
at. Day two is really the day I enjoyed most.

Manu Sporny: Okay.

Manu Sporny: Okay. thank you for, the report out, Phil and, Will.
interesting stuff. It'll be interesting to see, what some of the outcomes,
from that, meeting, are going to be. and since we don't have anyone, did
either of you or either of you able to attend kind of the ZKP Longfellow
kind of discussion or have some thoughts on that.

Will Abramson: I did not know.

Phillip Long: No, I did not either.

Manu Sporny: All right. that is that item then review of GDC in ZKPS. we
move into kind of updates from the BBS work. Greg, how things going in BBS
land
00:10:00

Greg Bernstein: What most interesting is to me u so first of all pseudonyms
is moving forward we're going to be presenting at the IETF meeting in the
end of this month. but what we've al also seen is we've seen more
implementers talking on the u IETF list. So we saw Ubico and I think people
from Cloudflare, sorry.

Greg Bernstein: they were going under the name Circle or something like
that, but there were Cloudflare people. so we've been seeing more
implementations. some feedback on This is and so hopefully we're getting
that base draft ready for last call. That's the kind of thing that's is
kind of got stalled with the very long review process because I think
mostly not because of anything terribly technical but I think it just
dropped off people's radar. So net net is that it seems like the base draft
is moving forward.

Greg Bernstein: We've got the PR in for pseudonyms with the everlasting
privacy. We'll be explaining the solution at the CFRG. We had a bit little
hiccup on getting the new draft version of that published, but it should be
coming out next week. And that's mostly what's happening. as far as privacy
preserving stuff and particularly with postquantum we have to kind of
remember that the ZKP stuff is doing things around a non-postquantum thing
right so the long fellow isn't postquantum

Greg Bernstein: Lee Harrow is a postquantum proof technique but it's doing
a proof over ECDSA and I think hopefully other monu techniques that are so
zero knowledge proof techniques that can allow us to prove things in zero
knowledge that are postquantum.

Manu Sporny: Please finish the thought.

Greg Bernstein: They use hash functions and they do cool stuff. But the
base technique is ECDSA to try and take a ZKP technique and put it around
MLDDSA or something like that is going to be a lot more difficult.

Greg Bernstein: And in addition, there are lattisbased techniques for
selective disclosure and anonymous credential techniques. if we've heard of
something called mtru, some of these other lattice techniques use a
trapdoor technique and that is what goes into the one privacy preserving
postquantum item that we've been looking at. There was a paper published
earlier on that. We just been kind of watching it.

Greg Bernstein: But the problem is we haven't seen any place that's been
doing any competition or something like that to get these postquantum
anonymous privacy preserving signatures going. So I know

Manu Sporny: Yeah, I guess that's largely where my question is around I
asked Matteo, there was some good back and forth on the mailing list around
the Longfellow ZK stuff. and I asked Matteo, he said, trying to get to
something that's postquantum is going to be much more difficult. And I
asked him, why exactly is that? I guess it has to do with some of the
complexity of MLDDSA and that I don't know maybe it's building a
cryptographic circuit that can take in a MLDDSA signature is just we're
talking gigabytes in size for the circuit maybe
00:15:00

Greg Bernstein: I think that's exactly what you're getting at because the
lattice techniques are more complicated. you heard in those discuss or the
emails things grew as the size of what you were hashing because basically
you're proving stuff about a hash and so the circuit gets bigger for the
more stuff you're hashing. That's why, they were one of those nice small
sizes of some of the ML doc stuff,…

Manu Sporny: Mhm.

Greg Bernstein: right? It was like, that's kind of small. There's no image
in there, right?

Manu Sporny: Got it.

Greg Bernstein: But that…

Greg Bernstein: but once again there are other lattice techniques that lend
themselves more to a selective disclosure unlinkable proof type of thing
and that was Oliver Sanders or I may be mispronouncing his name and that
research group had some stuff that was doing some of those things and so
it's a good question to put to cryptographers, like Anna and…

Greg Bernstein: some of those folks about that because I think just
throwing a ZKP technique against a lattice or one of these newer methods
might result in, as you said, huge circuits.

Manu Sporny: Mhm. Yeah.

Manu Sporny: I mean, which then basically, leaves us with postquantum
solution yet, And that's a big issue because we're effectively going to
regress back to selective disclosure being the only thing and tokens being
the only thing that's going to actually work. and so, trying to make sure
that we feature proof the community and the solutions. It may be that we
really need to start thinking about what the backup solution is once 2030,…

Greg Bernstein: yes.

Manu Sporny: 2035 hits. we all know how long it takes for cryptographers to
get to the next solution and we know for a fact that hashing should not be
susceptible to postquantum attack and single token usage isn't susceptible
to that and so what we may be looking at is some kind of hashbased solution
as a absolute backup.

Manu Sporny: so there's a question here around can we reuse existing
primitives and provide a worstc case scenario solution in data integrity we
don't get a postquantum secure mechanism in time and so what's the fallback
there and then kind of work forward based on that instead of basically
saying what that we're just not going to have an unlinkable, mechanism. and
we're waiting for one to appear. That feels like a much worse position to
kind of be go ahead, Will.

Will Abramson: So this is maybe a little bit left field but I wondered is
anyone tracking or following anything to do with cryptography. So not quant
postquantum but cryptography that is known to be secure…

Greg Bernstein: It's the key distribution people. Yes.

Will Abramson: because it uses quantum mechanics basically. So it isn't
post it's cryptography that uses quantum computing to be guaranteed to be
in the face of quantum computers.

Manu Sporny: We are at a distance.

Manu Sporny: We know a couple of people that have founded quantum key
distribution. so yes yes yes in a way…

Will Abramson: Yeah, I think it's primal that shot.

Manu Sporny: but again it's like an industry that is going to take I don't
know a decade to form there's so much patents and…

Will Abramson: Yeah, absolutely.

Manu Sporny: and whatever in the space right now and these are all
companies that are hardware anything and so a lot of the focus is on
simulators for postquantum key distribution.

Will Abramson: Early.

Manu Sporny: It just feels, very very early. excellent.
00:20:00

Will Abramson: No, I just share because I mean a couple of months ago I was
at a really cool talk in London about quantum computers and where it's
going and I just share this one link. I'm trying to work my way through it.
It's very deep and mathematical, but this is an excellent course on quantum
information theory and quantum computing if anybody digs that kind of stuff.

Manu Sporny: Dave, you've got your hand up.

Dave Longley: Yeah, I also wanted to direct people to once again the SQI
sign paper. It's got a section there on computing pairings, which is a
technique that's used by BBS to achieve unlikability. And there might be
something to that going forward. That's in section 8.3. And there's a link
to it from that table of contents.

Greg Bernstein: That would be great.

Manu Sporny: Very cool.

Manu Sporny: Yeah. I mean, again, this would be great. I guess what I'm
trying to get at here is that, given how long it's going to take for this
stuff to make its way through, but we could do a couple of things here is
really a question around where do we want to spend our time. we if there's
something behind this computing pairings thing we can do an experimental
crypto suite to try and put something together talk to the authors of SQI
ask them what they're focused on kind of go at it from that angle give them
a set of requirements that we have from BBS and say how would we do this in
the same way with SQI maybe invite them in to come

Manu Sporny: chat here and then that gives us, at least something to point
at hey, if SQI survives, then this thing might also survive. so that's one
and that would be quite a bit of R\&D. We would, as a community have to go
out and try to find where the would we could get the money to pay for that
kind of, level of R\&D. so that's the other thing is for example keeping a
set of effectively random values like a tokenization service where you can
prove in real time you provide a

Manu Sporny: postquantum signed, thing and you get back a postquantum
signed token from some kind of token provider and then you can submit that
as a very short-lived thing. The downside there being is that is 100% phone
home to whoever is giving you the token. Maybe we can create something like
a token provider service where any organization can run one of these things
where it takes an input VC does a transformation checks for a c certain
value and then expresses the value in a short-lived ephemeral VC that is
given to the holder who the holder can then provide and that's the way that
we achieve kind of scalability for the postquantum thing

Manu Sporny: without using any of the unlinkability cryptography but having
effectively an unlinkable token that's generated. So that's another fairly
large effort. it would kind of mirror the way that the true age system is
deployed and worked. we would, end up standardizing something along those
lines to make sure that we've got an answer for the unlinkable problem
that's more decentralized, doesn't phone back to the issuer, that sort of
thing. So that's the other, potential thing we could work on is instead of
trying to figure out a way to get the cryptography to work, figure out a
way to design a system that, does the tokenization of the initial VC so
that it's unlinkable.

Manu Sporny: totally different approach but one where we could actually
build and deploy that system today and then have use MLDDSA or any of the
postquantum things and not have to push any new cryptography through any
system. So, those are two approaches that we could take. any thoughts or
opinions from folks on which one of those we might focus on.
00:25:00

Manu Sporny: All without opinions, we're not going to move forward on
either one of those probably,…

Greg Bernstein: I think there's as Dave pointed out with the SQI and…

Manu Sporny: right? Mhm.

Greg Bernstein: with some of the lattice things, I think there are
techniques if we can get the cryptographic community more interested
There's techniques to do things like the pairings in postquantum ways that
would lead then naturally to anonymous type privacy preserving signatures.
however I'll be listening in on next week at the Simons Institute they're
having their cryptography thing.

Greg Bernstein: This next week is all going to be about proof CKP stuff.
They've got all the big names, but they actually didn't give the titles yet
of the talks. The big names are going to be like Baylor, Gay Cha or…

Greg Bernstein: whatever and such like that. So, I'll see if I can put some
questions to those folks. See what they say.

Manu Sporny: All right.

Manu Sporny: Sounds good. please keep us apprised. but I think in the
meantime, we're going to keep pushing the quantum safe crypto suites
forward. and please anyone report back in if they see something interesting
happen in the unlinkable postquantum all right so that is that item. you
also wanted to cover the data integrity presentation. one thing will I keep
forgetting to mention is I am not going to be here next week.

Manu Sporny: I will not be able to give an update on…

Manu Sporny: where we are with a number of the specifications. Hopefully
somebody else can cover that. I won't even be able to update the slide
deck. I'm just overwhelmed with much on my plate.

Will Abramson: Yeah,…

Will Abramson: no worries. No worries.

Manu Sporny: But know that stuff is moving forward these are the specs that
are moving forward at a rapid clip. and we probably do want to cover them.
so hopefully there'll be folks to speak up on each one of those.

Will Abramson: Issue 250.

Manu Sporny: Yeah,…

Will Abramson: That's issue 250.

Manu Sporny: issue 250 in the community.

Will Abramson: Yeah.

Manu Sporny: Okay. let's see. Here's the link there. let's see…

Will Abramson: I wanted to speak on Greg's thing about the presentation on
data integrity,…

Manu Sporny: what Yeah.

Will Abramson: but it's not till September, yeah, I mean one thing and…

Greg Bernstein: That's the September 23rd.

Will Abramson: you wanted to demo and one thing I could maybe help with we
could see one thing I like to do is use Jupy to notebooks. I have a Jupyter
notebook that works with SECP 256K1 and you run through every step in the
crypto suite and the data integrity right and you can document each cell
that you run and explain why. It's kind of like an explanatory demo that we
could run through on the call.

Greg Bernstein: Cool. one of the things I was …

Will Abramson: Also, people could run through it for themselves to just
kind of get a feel for what's really going on if that's the kind of thing
you're looking for.

Greg Bernstein: there's two different things I've been thinking of now. I
know. Go ahead. Okay.

Manu Sporny: No, please finish the thought.

Manu Sporny: I was just going to link you to some other material that we've
used

Greg Bernstein: So now I've done a bunch of these different talks and I
also did all the test vector code and I have all my repos for I do think
I've done stuff with JavaScript. it's little easier sometimes than I like
Python and all that but I've done all my prototyping for this stuff in
JavaScript. The other thing I also have not only did I do the test vectors
but I also have a test server. When we were very early on some of the tech
and data integrity I did server implementations for so other people could
interop against when we didn't have a lot of people when we first did
selective disclosure ECDSA.

Greg Bernstein: I talked with Harrison we were saying it would be like
implementing data integrity and I have two different themes I was thinking
about one was I used to teach pro web programming where he taught people
all the tech behind building a website and then adding in everything to
give you login and the sessions and all that stuff. And I thought about the
same theme what would it take if you had a university club or some kind of
club and you were going to have them give out credentials.
00:30:00

Greg Bernstein: you're going to have a wind surfing club and you're going
to give out credentials to see if people could check out equipment and such
like that and a whole kind of thing about what it would take and could you
do this all with our tech, because I don't do open ID and such like that
and I server side stuff, I issue credentials and such like that. I never
actually went into somebody's wallet or something like that. So, that's
what kind of one theme of a very small user, right, group, not big company.

Greg Bernstein: The other thing I was thinking about which is maybe a
little bit more technical but in data integrity we've got proof sets and
proof chains which are these nice mechanisms that really go nicely with
kind of business rules and such like that. And I also was noticing that I
was looking at some stuff, BC for wireless and I noticed that the BC API
stuff has some workflow kind of stuff and I was thinking about wow could I
combine is that of the right maturity that I could come up with a signature
chain workflow thing to demonstrate how powerful proof sets and signature
chains are.

Greg Bernstein: So those are my two kind of things and I would once again
have a slideshow but behind it I'd open source code maybe a more documented
tutorial to help people see the power of either of those things. So those
are my two ideas.

Manu Sporny: So just my two cents I think it might be more broadly useful
to step through the base technology when we get to proof sets and…

Manu Sporny: proof chains in the VC wireless stuff we can get pretty fancy
there but I think without some kind of tutorial on just the low-level stuff
I think we're kind of jumping ahead too much. so to be clear,…

Greg Bernstein: Okay. Yeah.

Manu Sporny: I don't know if we've seen a whole bunch of immediate use
cases around proof sets. Absolutely. Right. the immediate use case there is
you want to do ECDSA and…

Greg Bernstein: Yeah. questions.

Manu Sporny: you want to do postquantum and you want to issue one
credential that's where you'd use a proof set, And the proof chain stuff is
more like notary an endorsement, style use cases. But even then, some
people disagree on is a notary two signatures or is a notary, an additional
VC? And I think you want to kind of avoid those kinds of, discussions.
yeah. So,…

Greg Bernstein: Yes,…

Manu Sporny: so I like, what will said a lot about Jupyter Notebook step
people through kind of the processes. What I wanted to point you to is we
do have some core material that we've used in the past. So feel free to use
of this stuff, any of these diagrams,…

Greg Bernstein: the nice the beautiful diagrams.

Manu Sporny: so there's some, and these are very old slides at this point.
This is when we were just starting the work. things have updated. So be
very wary of number of implementations. Those numbers have grown quite a
bit since then. so that we've got one on data integrity and then we have
one on kind of very specifically selective disclosure in data integrity.
that gives you kind of what's the size of the signatures as you add
statements what's the size of the revealed thing.
00:35:00

Manu Sporny: how do you step through and sort and secure and sign and then
request and deliver the credential. so there's a lot of stuff you could
just copy and…

Greg Bernstein: Damn it.

Manu Sporny: paste from this. So please feel free to do that. that's it.

Dave Longley: And I wanted to make the point that it's implicit in sort of
these slides and everything. the strength of the approach whereby the
format of these credentials does not have to change, but you can start
securing them in any number of different ways and you can add new securing
mechanisms without affecting everyone else up the stack who's consuming
verifiable credentials because fundamentally they don't have to change
their software to process the format use it in any way. new cryptography
can be added to it. And that's something that's unique about the approach
that as if you walk through these sort of slides that are on the screen or
if you did s talked about sold you can implicitly get that because it's
like I can repackage this into a much smaller bundle send it and I don't
lose the cryptography but other formats don't let you do that.

Dave Longley: you lose the protection and other formats like how we're
talking about with MDL and applying ZKPs to it it's an inefficient process
and they'd have to change their format and everyone who consumes MDLs would
have to change how they pro receive and actually use the data in an MDL if
they wanted to improve that. And the data integrity approach makes it so
you don't have to do none of those additional layers have to change. You
only have to add a new crypto processing layer.

Dave Longley: And that would be something that's important I think to point
out u explicitly in the presentation.

Greg Bernstein: Yes, that's partially…

Greg Bernstein: what I'm pretty I got to make sure I get it that message
out. But I lived it because I was able to start with my I don't know what
did I started with? EDDDSA test then ECDSA test vectors, then SD, all
because of the structure of the processing. And so it just, a lot of code
reuse when I was coming up with those test vectors.

Will Abramson: Yeah. No, totally. I mean, they were amazingly useful. I
used your code and…

Will Abramson: just swapped out SEC P256K1 and generated all the test specs
for that spec that we're working on.

Greg Bernstein: Yeah, and…

Greg Bernstein: that should be the case for I haven't done it myself, but
for MLDDSA and the stateless hash Yeah,…

Will Abramson: Yeah, in theory. And I think that totally speaks to how we
need to generalize the spec, right? Because the code can be like that, but
the spec currently is a lot of repeating itself all over the place. And we
do need to do some work to make that more general

Greg Bernstein: I haven't staring as much as the spec. But when I saw one
of the same guy that I been using for the ECDSA and ECDSA cryptography, he
published MLDDSA stuff in JavaScript. I go, " I can come up with test
vectors or I can." But somebody else is doing that, aren't they?

Will Abramson: So maybe Greg me and you can take this offline. I mean I
would be happy to spend some cycles developing some Jupyter notebooks…

Will Abramson: if that makes sense. But what I think creating some sort of
code first demo would be excellent for people to just get it a little bit
deeper…

Greg Bernstein: Yeah. Yeah.

Will Abramson: because I didn't really get data integrity until I
implemented it fully. it's kind of complicated not unnecessarily. but you
have to get past the complexity to realize it's not actually complicated
and it's simple. But a lot of people don't get there,

Greg Bernstein: the thing I may be using to do this write up or I've
started I'm a big markdown guy and Quartto is a publishing system based on
markdown and if I mean one of the things is they're allow you to just embed
the Jupyter notebook type syntax right in it and…

Will Abramson: totally. Yeah.

Greg Bernstein: publish from it and things like that.

Greg Bernstein: So if you've never looked at Cordo I'm a big pandoc user
markdown but these guys have packaged it up and you can go from that to
revealjs for the slideshow and all that so can make it easier for other
people to work with monitor Yes.

Manu Sporny: at the risk of greatly ex expanding the scope of one
presentation. I think what you guys talking about is great. I think we're
fundamentally talking about kind of self-directed tutorials that people can
take themselves through but using that as the presentation material. So I
think it's wonderful and great you're willing to spend some cycles and
thank you very much Greg for spending cycles doing this. we're also
exploring this new website in the CCG mailing list and I think this might
be a really good thing to kind of put on the website meaning it would be
nice to basically say hey want to learn more about data integrity here here
you go and you kind of walk through it.
00:40:00

Manu Sporny: So either in that website or it could be on a website by
itself.

Manu Sporny: But one of the things that we've been trying to put some time
into we being digital bazaar is add creating more debugging utilities just
web- based debugging utilities. So, you can just go onto the website. I
don't know if you saw the Jason LD what is it? Next playground. now has
Seabore LD encodings.

Greg Bernstein: I would definitely …

Manu Sporny: So, it'll automatically take you to Seabore LD and YAML LD as
well. And we are going to be adding, the data integ the big thing that's
missing here of course is the data integrity stuff. and…

Greg Bernstein: okay. No,…

Manu Sporny: so we're going to be adding things to do data integrity here.
So again, it's not the Jupyter Notebook style tutorial stuff,…

Greg Bernstein: no, no.

Greg Bernstein: But it's a nice I mean I wanted to try and…

Manu Sporny:

Manu Sporny: but it's tooling thing.

Greg Bernstein: grab these different and remind people of things because I
forgot how much I use the JSONLD website to help me learn JSONLD and the
intermediate processing for debugging. so I got to make sure once again
it's going to be a short presentation, but everybody knows for a short
presentation, an hour presentation, you put in a lot of background. And so
I take a lot of notes when I put things together. So I might as well turn
that into a tutorial thing while I'm writing as I go along for the long
form version that somebody can just go to.

Greg Bernstein: Also, yeah, there's the credential playground and that can
issue what I never got as far as I never issued into wallets or anything in
any of my example code, right? I interoperated for the interop stuff. I did
the test vectors, but I never actually issued into a wallet. So I was kind
of curious to see…

Greg Bernstein: if that's something I can do without I'd rather not go get
into open ID and such like that. So issuer demo you've got it all good.

Manu Sporny: Yeah, there is I think so you have the ability to we can hook
up to multiple different issuers.

Manu Sporny: The downside being that the issuer needs to at least support a
very basic version of the VC API.

Manu Sporny: I think just the issue and verify endpoints. …

Greg Bernstein: Yeah, but that's something I already have code for,…

Greg Bernstein: so that doesn't freak me out,…

Manu Sporny: Okay.

Greg Bernstein: right? Because I had Okay.

Manu Sporny: Then we can just add you to this list. that is a fairly easy
thing to do. You just talk with Benjamin Young and he'll be able to just
add you in. should be a fairly easy integration. There's just one JSON
config file You provide your endpoints like your issuance endpoint and your
verification endpoint. and that's and then you'll show up in this list and
then you can issue into any wallet vary wallet should be able to hold the
thing you're issuing and then the verifier demo is you select something you
want to verify. You can also cut and copy and paste a custom credential
into here.

Manu Sporny: So if you want a totally different type of credential, you can
just dump it in here as raw json LD or…

Manu Sporny: link to a URL. and then you can call out to your issuer, have
that issue it and it sends it directly to any wallet that speaks. yeah.

Greg Bernstein: …

Greg Bernstein: I dig because I'm going to go with this theme of a college
club using verifiable credentials. So, that means they're gonna issue them,
you're gonna verify them, all that kind of stuff. walk through it because,
I love verifiable credentials. I've just been so focused on the
cryptography and I've kind of been a little while since I did the interop
of the various suites and such like that. So, it'll be a good review for me.
00:45:00

Greg Bernstein: And if it's a review for me, that means if I put it down,
it's a good review for everybody because sometimes when you have to see it
or review it so you can implement it. So I think that's a good idea rather
than getting too I love proof change and proof sets because I go, "Wow,
that's really cool. We can do all this stuff, but it's specialized." Thanks.

Manu Sporny: Yeah. okay. does that give you enough? Greg,…

Greg Bernstein: Yeah.

Manu Sporny: I want to make sure we can touch on our last agenda item.

Greg Bernstein: Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah.

Manu Sporny: And I might have to leave five minutes early. Yeah, that's
great. Thank you so much for working on that, Greg. And thank you, for
willing to help as well. let us know if there's anything, we can help on as
the weeks kind of roll on. okay, that is that item. let's talk about the
quantum safe crypto suites really quickly. Andre Andrea and Jerem presented
on their implementation of one of these postquantum crypto suites.

Manu Sporny: so specifically they implemented MLDDSA 44 and they went
through their implementation of it during the last credentials community
group call which was great to see. they've made some really great progress.
they have their own kind of it's a domain specific language for describing
how to create a verifiable credential. it's called Zen Room. I think it's a
really interesting way of approaching cryptography because it's very
declarative and it just uses kind of regular kind of human English
sentences fairly, straightforward. So, it was kind of like a no code
environment. You kind of describe what you want to have happen and then Zen
room kind of runs all the cryptographic operations behind the scenes to
make it happen.

Manu Sporny: and then they showed it generating a verifiable credential
that was secured with MLDDSA 44. There was some slight adjustment that they
needed to make. for example, they were encoding the signature value as base
58 instead of B We suggested B 64 URL. I don't quite remember what they
were using for the public key format. but they said they are using multi
key and multibase had some good discussion. So, if you're interested in
that thing, the video is up along with the transcript this past Tuesday's
call. and so since then, Andrea has said, "What do we need to do to move
this crypto suite forward?" I have not had a chance to respond to him yet.

Manu Sporny: We did discuss we need to update the names of these crypto
suites. I think and we have a issue to track that. we need to pick some of
the public key identifiers. so we need to do that. So we need to probably
chat with Andre and Jerem to make sure that we're aligned and…

Will Abramson: Sure.

Manu Sporny: moving this forward. yep the other part of it is the common
algorithm stuff and moving it into the data integrity specifications. I
think we have broad agreement to do that. we just need to do that and
that's where it requires coordination meaning it is definitely in scope in
the current BCWG to maintain and move that stuff around. We can do that
under our current charter. We don't need to recharter to do that. but the
BCWG, is taking a break until the end of the summer.

Manu Sporny: So we can't publish to one document and we can't start moving
things around. I expect that we'll be able to do that once the VCWG starts
up again. do you have any kind of questions on that?

Manu Sporny: Was that what you kind of wanted to talk to about the

Will Abramson: Yeah,…

Will Abramson: I mean I guess I've just been out of it for a little while,
but I'm happy to take on that work, To move it through this process. And I
think one of the things we talked about before is like if we're going to do
this whole refactoring, maybe it's good to just pick a couple and…

Will Abramson: and try and see what that looks like before we go whole hog
and do it all.
00:50:00

Manu Sporny: Mhm.

Will Abramson: But I think I know what to do because Greg says right we've
been in the code we know where there's repetition but I think one of the
challenges maybe you just spoke to is some of these changes are changes
that need to go into the data integrity core spec right so yeah maybe we
can just explore…

Manu Sporny: Yeah. I think that's right.

Will Abramson: what that would look in a PR to a quantum thing imagining
that the data integrity spec has changed just to have a

Will Abramson: Yeah.

Manu Sporny: Yeah. I mean, I think what we can do here is I mean, you've
gone a good bit towards that, You have a common algorithm section. I think
the presumption here is we would just lift that and…

Will Abramson: Yeah. Yeah.

Manu Sporny: put it into the data integrity spec when That's right.

Will Abramson: Yeah. With some text around how you'd extend and overwrite
those common algorithms, right? Sure.

Manu Sporny:

Manu Sporny: So, I think we have everything that we need to do that
refactoring in here. yeah.

Will Abramson: They just need to go a bit further. I think like Dave said,
there's more we can do. So, I'll try and…

Manu Sporny: Yeah. Yeah.

Will Abramson: do that.

Manu Sporny: The other thing I'm a bit concerned about is the parts of it.
we've only really defined selective disclosure for ECDSA, and I'm fairly
confident that we're going to have to define it for the postquantum suites.
and the only reason we didn't do it for EDDDSA is we just ran out of time.
and if we had a way of having pulling the common parts of SD or the
selective disclosure stuff out into data integrity, then I think we could
just apply a selective disclosure version of these kind of across the
board. making it so that we can do that more easily I think would be a
goal. But that is more work like way more work. I think so.

Manu Sporny: I don't think we need to do that as a first draft,…

Will Abramson: Cool.

Manu Sporny: but in time I think that ideally would be a goal of ours to
make that happen. All right. anything else? it's the other question I have
and I totally forgot what we decided here. Are we dropping the experimental
dash at this point or are we keeping it until we get the danger here is
that we put in an identifier and someone implements it and they deploy it
to production. we've seen that happen multiple times at this point.
Mastadon did that with one of our first crypto suites and we had to use a
new name.

Manu Sporny: the Jason Web Signature 2020 stuff escaped into the wild. what
are we thinking about renaming at this point

Dave Longley: Since we don't have our final version of this, I would say we
keep it the way it is for now. There will reach a point where we're going
to have to commit to something and we should switch the name at that point.
we went through something similar with the ECDSA and ED DSA suites. and I
think it's working out like we had an original name it escaped into the
wild but I think more or less with the new name everyone's implementing
that or has implemented that and I think it worked out So I think switching
the name is probably okay provided that there isn't some massive uptake of
this experimental one and then it sticks around forever.

Dave Longley: That's always the lesson from the x-header problem and the
CSS prefix problem in other spaces on the web. But I don't think we have
that problem here. if we start to see it happening, we should be vigilant
and switch the name up.

Manu Sporny: Switch the name away from experimental or switch the name as
increase the year.

Dave Longley: Yes. yeah,…

Manu Sporny: So you're arguing for let's keep the experimental prefix for
now. That shouldn't really affect any of the implementers and then once we
Right.

Dave Longley: at least until we get it into VCWG or if we start seeing
uptake, then we can drop the experimental.

Manu Sporny: All and maybe we do it when we go into CR …

Manu Sporny: because again it's like a search and replace string search and
replace okay all right I think that's it for the call I need to drop a bit
early for another call thank

Dave Longley: Yeah, I think the triggering event is whether or…

Dave Longley: it seems like this crypto suite is really starting to get
uptake and that's going to sort of lock it in order for us to have interop.
00:55:00

Manu Sporny: Thank you everyone. really appreciate all the discussion today
and all the work across the various things we're working on. we will not
have a call next week. I'm on the road. but we will meet the week after
that. have a wonderful rest of your day, wonderful weekend, wonderful next
week and…

Greg Bernstein: All right. I

Manu Sporny: we will chat again in two weeks. Thanks all. Bye.

Will Abramson: Cool. See you.
Meeting ended after 00:55:46 👋

*This editable transcript was computer generated and might contain errors.
People can also change the text after it was created.*

Received on Friday, 11 July 2025 22:12:23 UTC