Re: Introduction and interest in contributing to the Credentials Community Group

On Fri, Jan 23, 2026 at 4:08 AM Amir Hameed <amsaalegal@gmail.com> wrote:
> I would like to introduce myself to the group and express my interest in contributing to the technical discussions and ongoing work related to Verifiable Credentials and their long-term security, interoperability, and deployment models.

Welcome to the community Amir, we are lucky to have your input and insight. :)

I just wanted to point out some people that you might consider
collaborating with in the community based on the interests you
outlined:

> Zero-Knowledge Proof systems: design and implementation of a challenge–response authentication mechanism using ZKP constructions for privacy-preserving verification.

We have calls related to the standardization of the BBS ZKP system
once a month on Fridays. Calendar invite is here:

https://www.w3.org/events/meetings/c4bcdfe1-cd32-4d07-ab07-609ca3eee120/

It isn't at a good time for you, but we do a lot of work in the Github
repository which can be found here:

https://github.com/w3c/vc-di-bbs

There is also an DIF WG that meets to discuss the low-level IETF BBS
work as well, though that work is mostly done and just waiting on the
glacially slow CRFG review process.

> Quantum-safe cryptography: development of a full software implementation of QKD protocols (including decoy-state BB84, entropy estimation, error correction, and security reporting) alongside architectural work on post-quantum cryptography (PQC) integration and hybrid trust models.

There is active work happening here as well, again in the Data
Integrity calls here:

https://www.w3.org/events/meetings/c4bcdfe1-cd32-4d07-ab07-609ca3eee120/

I know that Greg Bernstein is active in both the BBS and PQC work, so
you might reach out to him to see what sort of effort would be most
helpful to him: gregb@grotto-networking.com

> Protocol security engineering: threat modeling and adversarial analysis at both protocol and network layers, including considerations around replay attacks, key compromise, registry trust assumptions, gossip/replication models, and cross-domain verification.

Will already mentioned the threat modelling work, which we're going to
need increasing help with, so you might consider becoming a W3C
Invited Expert to officially join the DID and/or Verifiable
Credentials Working Group here:

https://www.w3.org/invited-experts/

-- manu

-- 
Manu Sporny - https://www.linkedin.com/in/manusporny/
Founder/CEO - Digital Bazaar, Inc.
https://www.digitalbazaar.com/

Received on Sunday, 25 January 2026 16:11:40 UTC