- From: Manu Sporny <msporny@digitalbazaar.com>
- Date: Sun, 25 Jan 2026 11:11:00 -0500
- To: Amir Hameed <amsaalegal@gmail.com>, Greg Bernstein <gregb@grotto-networking.com>
- Cc: W3C Credentials CG <public-credentials@w3.org>
On Fri, Jan 23, 2026 at 4:08 AM Amir Hameed <amsaalegal@gmail.com> wrote: > I would like to introduce myself to the group and express my interest in contributing to the technical discussions and ongoing work related to Verifiable Credentials and their long-term security, interoperability, and deployment models. Welcome to the community Amir, we are lucky to have your input and insight. :) I just wanted to point out some people that you might consider collaborating with in the community based on the interests you outlined: > Zero-Knowledge Proof systems: design and implementation of a challenge–response authentication mechanism using ZKP constructions for privacy-preserving verification. We have calls related to the standardization of the BBS ZKP system once a month on Fridays. Calendar invite is here: https://www.w3.org/events/meetings/c4bcdfe1-cd32-4d07-ab07-609ca3eee120/ It isn't at a good time for you, but we do a lot of work in the Github repository which can be found here: https://github.com/w3c/vc-di-bbs There is also an DIF WG that meets to discuss the low-level IETF BBS work as well, though that work is mostly done and just waiting on the glacially slow CRFG review process. > Quantum-safe cryptography: development of a full software implementation of QKD protocols (including decoy-state BB84, entropy estimation, error correction, and security reporting) alongside architectural work on post-quantum cryptography (PQC) integration and hybrid trust models. There is active work happening here as well, again in the Data Integrity calls here: https://www.w3.org/events/meetings/c4bcdfe1-cd32-4d07-ab07-609ca3eee120/ I know that Greg Bernstein is active in both the BBS and PQC work, so you might reach out to him to see what sort of effort would be most helpful to him: gregb@grotto-networking.com > Protocol security engineering: threat modeling and adversarial analysis at both protocol and network layers, including considerations around replay attacks, key compromise, registry trust assumptions, gossip/replication models, and cross-domain verification. Will already mentioned the threat modelling work, which we're going to need increasing help with, so you might consider becoming a W3C Invited Expert to officially join the DID and/or Verifiable Credentials Working Group here: https://www.w3.org/invited-experts/ -- manu -- Manu Sporny - https://www.linkedin.com/in/manusporny/ Founder/CEO - Digital Bazaar, Inc. https://www.digitalbazaar.com/
Received on Sunday, 25 January 2026 16:11:40 UTC