- From: <meetings@w3c-ccg.org>
- Date: Wed, 11 Mar 2026 06:51:56 -0700
- To: public-credentials@w3.org
- Message-ID: <CA+ChqYfFne00rxpUs3yy9fGX3p7KToLLNLLtZdiiB=3OSyTnPA@mail.gmail.com>
This CCG Atlantic Weekly meeting focused on a review of Q1 2026, highlighting progress on various work items and discussing future focus areas. A significant update was the successful rechartering of the Verifiable Credentials Working Group, which now includes a broad range of new specifications. The meeting also touched upon the ongoing development and potential W3C adoption of the CCG meeting archiver, emphasizing its role in streamlining meeting processes. Several work items were presented, showcasing advancements in areas such as VC render method, confidence method, VC API for life cycle management, and data integrity 2.0 with a focus on post-quantum cryptography. Discussions also covered the status of VC delivery test suites, DID resolver testing, and the transition of VC education efforts. The meeting concluded with a look at proposed work items, with a particular emphasis on the potential for standardized read APIs using ZCAPS for wallet storage and the growing adoption of W3C Verifiable Credentials by other standards bodies. *Topics Covered:* - *Verifiable Credentials Working Group Rechartering:* The Verifiable Credentials Working Group has been successfully rechartered for 2026, expanding its scope to include numerous new specifications, signaling strong community support and global engagement. - *CCG Meeting Archiver:* The infrastructure used for this meeting, which transcribes, records, and archives meetings, is being considered for adoption by the broader W3C, potentially becoming the standard for official working group meetings. - *VC Render Method:* This work item is focused on defining how Verifiable Credentials should be displayed, including aspects of templating, sandbox iframes, different modalities (visual, audio, braille), accessibility, and internationalization. - *VC Confidence Method:* Progress has been made on defining what constitutes confidence in the subject of verifiable credentials, addressing topics like biometrics, proof of cryptographic key possession, evidence, and clarifying terminology like "holder binding." - *VC API for Life Cycle Management:* This specification is moving onto the W3C standards track and aims to provide vendor-neutral APIs for credential issuance and verification systems, supporting various VC formats and simpler exchange workflows. - *Verifiable Credential Barcodes:* This work item is now in the recharter for the VC Working Group, with initial progress made and specific sections like privacy needing further discussion. - *Verifiable Credentials Over Wireless:* This work is currently back-burnered due to the complexity of offline scenarios and the increasing prevalence of online connectivity, although NFC-based transmission for tap-to-share is progressing. - *Verifiable Credential Refresh:* A solution exists and is deployed in production, but interest in a global standard for refresh mechanisms is currently low from issuers who haven't yet experienced the pain of credential expiration. - *Issuers and Verifiers (Recognition Credentials):* Work is progressing on defining a new credential type for explaining what is recognized in terms of who is recognized and what they are able to do, with ongoing discussions on naming conventions and community input. - *Data Integrity 2.0 (Quantum Safe):* This work item involves refactoring to extract common algorithms and procedures, with a significant focus on integrating post-quantum cryptography, including NIST-approved signature algorithms and establishing clear naming conventions and test vectors. - *VC Delivery Test Suites:* The test suites have been largely static, but there is a push to transition the canibc.com platform from a community project to a fully open-source W3C code project with improved governance for test suites. - *DID Resolver Test Suite:* A first pass of the test suite for DID resolvers is available, and implementers are encouraged to submit their public HTTPS endpoints to demonstrate conformance with the new DID resolution specification. - *VC Education:* This task force has reached its goals, including facilitating the transition of Open Badges to V3 and demonstrating interoperability of credential wallets, and is being folded back into the CCG. - *DID Link Resources:* This topic intersects with DID URL path handling work in the DID Working Group, with ongoing, but not fully clear, intentions. - *Proposed Work Items & Focus Areas:* Discussion touched on the growing adoption of W3C VC work by other standards bodies and the potential for standardized read APIs using ZCAPS for wallet storage, with strong support from the community for this direction. *Action Items:* - Greg Bernstein will be contacted to schedule a follow-up presentation on the Data Integrity 2.0 (Quantum Safe) work. - Implementers of DID resolvers are encouraged to submit their public HTTPS endpoints to the VC test suite to demonstrate conformance. - Individuals with interest and capacity are encouraged to reach out on the mailing list regarding proposed work items, particularly the standardized read API using ZCAPS. Text: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-atlantic-weekly-2026-03-10.md Video: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-atlantic-weekly-2026-03-10.mp4 *CCG Atlantic Weekly - 2026/03/10 11:59 EDT - Transcript* *Attendees* Alex Higuera, Alex Jackl, Benjamin Young, Dmitri Zagidulin, Elaine Wooton, Erica Connell, Greg Bernstein, Gregory Natran, Harrison Tang, Hiroyuki Sano, Isaac Henderson, JeffO - HumanOS, Jennie Meier, Joe Andrieu, Kaliya Identity Woman, Kayode Ezike, Mahmoud Alkhraishi, Manu Sporny, Phillip Long, Ted Thibodeau Jr, Will Abramson *Transcript* Mahmoud Alkhraishi: Hello we'll get started in 3 minutes. Mahmoud Alkhraishi: Can you see my screen? Alex Jackl: Yes. Yeah. Mahmoud Alkhraishi: let's get started. Thank you everyone for joining us today. It is Tuesday, March 10th. IPR note, please make sure that you have signed the IPR agreement for any substantive contributions to the CCG and please make sure that you adhere to our code of conduct. Thank you everyone for joining us today. we're going to be going through a review of Q1 for 2026, what happened, where we are at CCG, and hopefully things we want to focus on going forward. thank you to everybody who's currently leading a work item and let's get started. Before we do that though, does anyone have any announcements they would like to make? Any things they would like to share with the broader group? Mahmoud Alkhraishi: Minor place. Manu Sporny: Just as a high level,… Manu Sporny: I know we'll get into this in some of the slides, but the vote for the 2026 rechartering of the verifiable credential working group, the vote closed a week ago. successful, lots of positive support, no objections, which was great to number of interesting new companies, supporting the work. so that's good. as folks probably also remember that put a huge number of new specifications in scope for the group. Manu Sporny: we are working on render method and confidence method but the fble credential API for life cycle management verifiable credent postquantum signatures verifiable recognition credentials wireless all of those things were put in scope so that's good last minute there were requests to put in the European 00:05:00 Manu Sporny: in digital product passport work as well as the European business wallet vocabulary work and that is now listed in scope as well which is great to see engagement from Europe on W3C verifiable credentials. as far as I know there were no objections on any of those additions as well. and we should hear an announcement from the verifiable credential working group on that this week. So that's great news. huge thank you to the CCG for helping to incubate all of those items. this is great. the pipeline that we spent a decade setting up is operating as designed. and we're going to see a lot more global standards around verifiable credentials on the standards track as a result of that. That's it. Mahmoud Alkhraishi: Thank you, Lana. does anyone else have any announcements they'd like to make? Awesome. let's get started then. So, we're going to review current work items and then we're going to look at some proposals and some upcoming changes. For the current work items, we have pretty big list of work items that are quote unquote ready for promotion. A bunch of those, as Mana mentioned, have been promoted as of last week. We're going to review those and then see what next steps are there and things that are currently ongoing that are not yet ready for promotion. So, the CCG meeting archiver manu brought this up. Do you want to talk about it a little bit about… Mahmoud Alkhraishi: what it is and what we're trying to do? Yeah. Manu Sporny: Yeah. Yes. Manu Sporny: Happy to. so, this meeting we're having right now is using this infrastructure.'s Google It transcribes, it records, and when the meeting's over, it autoarchchives onto our CCG servers. It publishes minutes for archival on the CCG mailing list and does a variety of things like that. they like the way that we run things here and so they've gotten really interested in using this for official working group work. and so it looks like it's once the BCWG is, rechartered, the question is going to be brought up about whether or not they're going to use this infrastructure to do it. which is great. and if it goes well there, then it might be that the entire W3C starts using the infrastructure. Clearly, we are not going to foot the bill for that. Manu Sporny: the CCG is not going to, but it'll be kind of absorbed into the W3C as the way that they run meetings. It'll be voluntary on a working group by working group basis. So, nobody needs to, stop using IRC if they don't want to. the new updates are that we had to convert the Google meetings and the chat transcript and all of those things into IRC format so the W3C tooling could run on it. but it does which means that all of the special W3C commands that have existed come into existence over the past 20 7 years or whatever are now possible. Manu Sporny: I mentioned this is not an official work item, It's just something like we built for the community. I don't know if it should be an official work item. Probably It hasn't heard it, since and then some output at the bottom of the screen. That's kind of what the W3C generated minutes for the W3C meetings looks like. that's it for this update. Mahmoud Alkhraishi: Sorry, I'm on mute. I think you're on deck for five or six in a row. Manu Sporny: I this so Dimmitri is on deck for this. Mahmoud Alkhraishi: Do you want to just Okay. Please. Manu Sporny: The other good news is we've got leaders in this community that are taking point on many of these specifications. Dmitri over to you. Dmitri Zagidulin: So yeah a lot of really good conversations happening on the VC render method task force calls which I highly recommend everybody join because in a way is deciding a whole bunch like a big chunk about the VC world which is look at VCs how they're going to interact with them. at the moment so it's an extension point of each verifiable credential can carry with it the strong suggestion from the issuer overridable of course by the user software a strong suggestion of when displaying this credential this is how you should display it. 00:10:00 Dmitri Zagidulin: So we're talking about a number of things. how to essentially do templating, how to display credentials in sandbox iframes. what to do when credentials are in different modalities like visual, audio, braille, things like that. So essentially we're kicked off the process of horizontal reaching out to the W3C accessibility group and lastly touched on the subject of internationalization localization in case that a credential is not only multi- language but the display differs by country this would be the mechanism for it. Mahmoud Alkhraishi: Awesome. … Dmitri Zagidulin: Yeah, super important topic. Everybody should join in. That's it. Mahmoud Alkhraishi: the confidence method. Joe D. I don't think Denin's on. Joe, are you on, please? Manu Sporny: I don't see him. I can take this one. so the confidence method has been making good progress. a lot of the meetings have been focused on actually let me go back. so render method and confidence method are in scope for the VC working group. so this is kind of like an update on what's happening in the VC working group with those confidence method has had a number of good conversations around what it is and it isn't. we are covering some topics that we've kind of pushed off for many years biometrics and what does that mean and how do we do it safely and what are the guard rails there. Manu Sporny: but we are also talking about pretty straightforward things that we've talked about for years how do you do proof use of a cryptographic key right proof of possession a digital signature using that's a part of confidence method as well. there's also a discussion around how does evidence play into this? do you use evidence for the confidence thing? Are they two separate things? And so there's some talk around like we really need to be clear about when evidence is used versus the confidence method. There has also been a lot of discussion around the term holder binding. Manu Sporny: the group has I think come to consensus where that's a really bad term and it people need to stop using it because it doesn't mean what people think it means. you can't bind things to a holder. there's conversations around device binding and how that's different from holder binding. but basically the group I think is getting ready to write some stuff in the spec about people really should stop talking about holder binding. it's confusing. A confidence method is about raising confidence in who the subject of, a particular set of statements is about. and so we're talking a lot about just refining what the best way to talk about this stuff is to create the least amount of confusion around it. it is adopted on the standards track. Now there's still not a lot of PRs that have been raised against the spec. Manu Sporny: we're still in the kind of really nailing down exactly what the spec is about and what it can do and can't do. more recently, there was a really interesting based on a presentation in CCG. so the true eyes.ai folks presented, they mentioned that there's a way potentially to do privacy preserving biometrics on the client side. So your biometrics never leave your device. but you can strongly authenticate on the device against biometrics and send a proof that you did that elsewhere so that the verifier doesn't receive any of your biometrics. They don't receive a video feed. They don't receive a picture of you. They don't receive any of that stuff. Manu Sporny: They just get a verification that your device was able to run an algorithm that checked your, driver's license image and You're like You're really there. You're not an AI generated, video stream and so on so forth. So, that is kind of where confidence method is right now. I think everyone's pretty happy about the direction that it's going in. that's it. 00:15:00 Mahmoud Alkhraishi: Thank we have the VC for life cycle management VCOM. Mahmoud Alkhraishi: I guess that's you again, Unless there's anybody else from that group that's on Manu Sporny: Pat Patrick. Manu Sporny: Yeah, Patrick's not here. yeah, I can take this one, too. the VC API for life cycle management. it's approved and it's in the new 2026 VC working group charter. so it's going to become, officially on the W3C global standards track. Mahmoud Alkhraishi: Yeah. Manu Sporny: The group we're meeting today, we meet every week. and we're continuing to refine that the spec covers a whole bunch of things. So what we found is that there's a bunch of vendor lock going on in the issuance systems like behind OID4 VCI and OID4 VP there no APIs defined on how a vendor plugs into a government's issuing and verification system or a school's issuing and verification system. So VC API provides those APIs so that you're not vendor locked. Manu Sporny: it supports any format. So M W3CVC. It's agnostic to those formats. largely we're focused on W3CVC's of course. it supports OID4VP. but it also supports alternatives that are simpler VC workflows and exchanges. there are 27 implementations of some variety that are out there. it is used heavily for the test suites. it has been in some capacity for years. but we continue to refine but it's a pretty good and stable at this point. Manu Sporny: people are shipping production software on top of it and so it's nice to see it going onto the standards track still needs quite a bit of kind of editorial love. We need to make a good second pass on it. We need to make concepts easier to understand. but contentwise it's got a lot in there that is helping people implement interoperable systems. Manu Sporny: That's it. Mahmoud Alkhraishi: The verify potential barcodes. Mahmoud Alkhraishi: Yeah. Manu Sporny: Yeah, I don't see Wes, so I can Elaine, do you want to take this one? Manu Sporny: Just a high level on what it's Elaine Wooton: Yeah. Yeah. Elaine Wooton: I'm here and I can talk very little about it, but yeah, it's in the recharter and so we're going to start working on it. Manu's indicated that a huge amount of the work is actually already done. There's just some sections we need to hash out. I think there's privacy. so we'll need to work on that. But otherwise, I don't want to jinx it by saying it should be pretty quick, but hopefully it'll be pretty quick. Mahmoud Alkhraishi: All anybody else wants to add on verify credential barcodes other than hopefully pretty quick? All next up, verify credentials over wireless. Mahmoud Alkhraishi: I don't think cash is here. Some mano. Yep. Manu Sporny: Yeah, I have to do this one. Manu Sporny: This one's back burnered a little bit. we are making good progress on it. Meaning Visual Bizarre is doing an implementation. it's largely around kind of first responders and offline scenarios. so can an individual use it in a disaster response like somebody's house is completely flooded or burns down or some masscale disaster happens like the California wildfires and this individual goes to a disaster recovery center or they're out in the field they have their mobile phone on them but really not much else. Manu Sporny: How do you do tap to share for VCs both to transmit and receive? we do have an NFC based mechanism that is a tap to transmit that that's come pretty far along over the last year. we are kind of doing some of that through render method. so there's still kind of an open question on how much should we move We know that we can run the entire BC API protocol over but as everyone knows NFC only transmits at 1 kilobyte a second which is not a lot of data, and so there's upscale to Bluetooth and that sort of stuff that's possible. 00:20:00 Manu Sporny: But this is one of the things where it's kind of like getting a bit of a back burner to everything else that's going on because it turns out that the online use cases which, VCs were designed for from the beginning are the ones that tend to be the easiest deploy to deploy and prove the technology out on offline use cases. are much more few and far between. and have demonstrated that you need new hardware and that becomes difficult to deploy. So the work is happening it is in the new charter… Manu Sporny: but it is not one of the highest priorities right now… Mahmoud Alkhraishi: Why is Bluetooth at risk? Mahmoud Alkhraishi: Or did I misunderstand? Okay. Manu Sporny: because no one's really implementing it. most of the use cases that we have these days even if you're out in the middle of nowhere Montana if you're using Mobile you're connected to one of the satellite constellations. So the idea that you're going to be offline is becoming less and less of a thing. Even in large scale disaster scenarios one of the first things that they come in and set up are portable cell towers to do to connect everyone back up again. Right. so they're there they're not very common use cases Manu Sporny: where in and Bluetooth has you can use it but it's kind of like a pain to do pairing sometimes and… Mahmoud Alkhraishi: Mhm. Yeah. Manu Sporny: couple that with some of the limitations that Apple has on their platform around NFC tap to upgrade to Bluetooth. it's at risk because a lot of I have an online connection and if I don't have an online connection I'm just going to use my physical card, but it's important like we won't Yeah. Mahmoud Alkhraishi: That's a risk to everything, right? It's not a risk just to Bluetooth. that would be the risk to this entire spec, right? Mahmoud Alkhraishi: I hear your point about move being harder to work with and that if we can get NFC to work that's probably good enough,… Mahmoud Alkhraishi: but the risks you outlined there are risks to both methods, right? The risk is to the entire spec rather than to just one of them. Am I misunderstanding something? Manu Sporny: potent there's a nuance there that I think matters meaning people are used to doing tap to pay at retail and… Manu Sporny: checkout and that's not an offline use case like everyone's online, but it's way nicer to be able to tap to share versus scanning a QR code. So, that's a convenience thing. Mahmoud Alkhraishi: Yeah. Manu Sporny: That's why NFC used as a convenience thing is positive because that's not necessarily an offline use case. Bluetooth is a little more like, you can tap to NFC and then you can upgrade to Bluetooth, but it requires you clicking on things on the screen and sometimes people get confused about it and sometimes Bluetooth devices don't pair, necessarily. So, Bluetooth is useful when you have devices that pair often, but if you're trying to pair while you're in an airport for the first time, there's some negative experiences people have had… Mahmoud Alkhraishi: Yeah, fair enough. Manu Sporny: where they're like, the technology doesn't work at all." and so that's why Bluetooth is slightly different than NFC. Mahmoud Alkhraishi: Greg, you had your hand up and it's down. I don't know. Is there anything you want to do? Greg Bernstein: A lot of this has to do with the implementations of Bluetooth and… Greg Bernstein: and the support on the different phone platforms. Bluetooth low energy has got good support but it doesn't have the right mechanisms. it doesn't have a TCP functionality and so there's when you get down into these details and trying to do things crossplatform we start running into issues with Bluetooth u because it's just not supported the same way across the different platforms and so it's really a platform issue not 00:25:00 Greg Bernstein: the technology itself So yeah, NFC easy to do well supported and such like that. So yeah, I was looking at this for a bit too and digging into the Bluetooth specs and it's a bit of a mess. Mahmoud Alkhraishi: Okay, thank you. does anyone have anything else on this spec? All right, next up is verify conditional refresh. Demetri, do you wanna or Caprice or No. De, do you want to walk us through it? Dmitri Zagidulin: No. So, I would look to Manu for this one. I haven't been active in that task force. Manu Sporny: Yeah, problem. This one is this in kind of the same state as the wireless stuff. it is used out in production broadly in true age. the California DMV app uses it. refresh is something that we thought would be used more often than it is for identification cards, but what's turned out is MDL is doing a refresh every 30 days, right? they don't and it's hardcoded into the MDL digital wallets. they kind of know, which MDL they support and they know the specific states refresh interval and so they just automatically do the refresh thing there. and they kind of did the same thing with the VCs used for those. Manu Sporny: and then what we've also found is the VCs have actual revocation lists and bitstring status list. And so what the digital wallets are doing is just sending the person back to the original site once the credential times So, refresh ser, we have a solution here. and it's already deployed and out there. And the people that have already deployed and put it out there are kind of like, I don't know, it's working for us. I don't know if we really need a global standard for this. We still want to push it through the W3C to make sure that it is approved and in the new charter. Manu Sporny: but we're not getting a lot of interest from issuers yet to say we really want the refresh mechanism to be easy for the individual. Mahmoud Alkhraishi: Hello and Manu Sporny: I think this also has to do with some of these VCs that are being are being issued for years and they haven't felt the pain of what happens when that credential expires, right? So, I think this is largely driven by issuers haven't felt the pain yet and we really need to get this in place before they hit that kind of pain. and they're probably going to hit the pain, when the current credentials expire, but that's not going to be for at least the credentials we're aware of. So, again, this is semi semiback burner. There is a solution. we might make some updates or changes to it. but for the people that did think ahead and that are using this, they're not really too concerned about it. That's it for this item. Mahmoud Alkhraishi: Fair enough. All right. issuers and verifiers. Do we have anybody from Isaac? Do you want to walk us through it? Isaac Henderson: I was not active in the last two months actually because I wasn't parentally. So Manu and Benjamin they were active. So I think it would be great that they could give that update. So, let's find out. Mahmoud Alkhraishi: Ben, would you mind walking us? Benjamin Young: Yeah, sure. Benjamin Young: So, we're meeting Tuesdays at 11, so just before this call. and have been working through mostly naming for the last month and a half or so as well as dealing with some stuff David Chadwick was bringing in from the EU work on lists of trusted lists and trying to match some of that work as much as possible. we are working on a verifiable recognition credentials is listed there as the likely winner. There's a discussion happening on the CCG list and an issue for that if anybody's interested in weighing in. but ultimately this looks like a new credential type for explaining what you recognize in terms of who you recognize and what you recognize them to be able to do. 00:30:00 Benjamin Young: Then we love participants from anybody interested in that problem space. Benjamin Young: Thanks. Yeah,… Mahmoud Alkhraishi: Thank you. Mahmoud Alkhraishi: This is now in the new VCW charger, right? I think I read that there, but I'm blanking. It is. Benjamin Young: I believe it probably depends on… Mahmoud Alkhraishi: And are you guys going to keep the same meeting time going forward, or is that probably going to change after the adoption? Benjamin Young: what chaos ensues once the working group picks back up. But I don't believe we're planning to move the meeting. Mahmoud Alkhraishi: Man. Manu Sporny: Yeah, plus one to what Benjamin said. I don't think we're planning to move the meeting. One of the things that's changing in the verifiable credential working group is we have so many work items the only way that we're going to be able to get those things done is if we parallelize all of the work. And so actually the CCG has been really helpful in this. We have created parallel work streams to work on the work items and those work streams will probably just transition into the actual working group meeting calls. So we won't move in theory we're not going to move any of the times. We're going to continue meeting but it's going to switch from being a CCG call to being an official verifiable credential working group call. Manu Sporny: and we're going to have to make sure that anyone that is not a W3C member gets in as an invited expert if they've been helping out. there's some of that process stuff that needs to be changed, but I would expect that most of the meetings that we have on these work items are just going to stay at the Same people are going to be showing up to them, but it's just going to transition from a CCG meeting to a VCWG meeting. Mahmoud Alkhraishi: Thank you for that clarification. that's super important. does anyone have anything else they want to bring up about issuers and… Mahmoud Alkhraishi: verifiers soon to be recognition credentials? Please. Phillip Long: Just a question for When is the restart of the regular meetings going to happen or is it continuing a pace? Benjamin Young: Yeah,… Benjamin Young: I don't think we're going to let out. so we met just before this call and we'll be back at it in that same time next week. it is a weekly call, so love to have you join. Phillip Long: Yeah. Yeah. Very good. Thanks. All I'll rejoin. Mahmoud Alkhraishi: All right. the data integrity 2.0. There's a lot of stuff here, Greg, do you want to walk us through it? Greg Bernstein: My gosh, what did we grouped a lot of things in here. the first thing we're doing with data integrity is we're doing some refactoring to take some of the stuff that was in some of the specific crypto suites like ECDSA that were used by multiple crypto suites, factor it out and put it in a place more logical. So that is stuff like the selective disclosure procedures. Greg Bernstein: Okay, so part of this one is to put common algorithms and procedures in some place that makes more sense rather than hiding them in a specific crypto suite. Having BBS refer to ECDSA is not as good as having BBS refer back to data integrity 2.0. The other place where some of this has come up is with the quantum safe work because we have a lot of very similar patterns that keep being repeated and we've done this with ECDSA, EDDDSA. Greg Bernstein: So these are different signature suites that we turned into VC crypto suites. And after doing this for a while and producing test vectors, we see common patterns and it's like, can we factor these out because those of us that help generate test vectors see these common patterns and we can take advantage of it in our code and make it easier for us to implement this stuff. And we don't want to get too indirect and too abstract in our specs with too much parameterization of algorithms, but a bit does seem to help. So that's what we're exploring. there's two aspects of this. Factoring out common routines that are in the crypto suites and then looking at common patterns. 00:35:00 Greg Bernstein: and we're trying this out right now with the u quantum safe stuff. I do have a lot more to say about quantum safe if we want to do that later. or if we can do it now, that's your choice. Mahmoud Alkhraishi: I think go ahead and talk about it now. I think probably it's here. Greg Bernstein: So, let me throw some stuff just if you don't have the link link to quantum safe. what's happened? first of all, we have two NIS specs that have been solid, have not changed for a year and a half, almost going on two years. That's FIPS 204 and FIPS 205. So that's module lattice digital signature algorithms and we're only concerned with the new postquantum signature algorithms not the key encapsulation methods. Okay, so we have two of those. Previously in the quantum safe spec, these were labeled as experimental. They're not really experimental anymore. There are open-source public domain implementations of these things. Greg Bernstein: the other thing that has also changed is the fact that a key NIST spec on key management was updated in December to talk about the postquantum algorithms and They changed the classic way of talking about strengths into something they call security categories. And this is very helpful for us to provide guidance because we don't want to be writing and making this stuff up or quoting the original literature. Greg Bernstein: It's much better for us to be able to just quote the nice and nest key management spec like we've done in our previous what we call classical crypto specs like ECDSA and EDDDSA. And so that's very helpful because that will set rules like what hashes you should use to go with what signature strengths and things like that. So the other thing is BIPS 206 is supposed to be coming out sometime soon and that's the Falcon suite. Greg Bernstein: So in the DI data integrity quantum safe right now we have four different methods. Okay MLDDSA stateless ash DSA SLHDSA falcon and ski sign. Falcon so the first two are already PIP standards. Falcon is supposed to become FIP standard. after doing some of this data integrity update stuff and looking at these common patterns, we chose to refactor the U document a bit to make it easier to bring in new postquantum stuff and bring in things at different security strength levels. Okay, so we've refactored the document and the algorithms a bit. Greg Bernstein: To make that easier to do, we've come up with naming conventions and select, made it very clear which parameter sets and algorithm flavors, for example, for SLHCSA. All our previous work has been on Shaw 2based hashes and so we're using the variants based on Shaw 2 rather than Shaw 3 based hashes. They're both listed by NIST as things to do, but it's like we have to make a decision. Then we come up with a naming convention for the crypto suite and So all that pieces in place, which you can see in the updated document, it's time to add test so we've added test vectors for the MLDDSA and SLHDSA. Greg Bernstein: And we've done that in a way that should be generalizable because we've broken that up into common algorithms and to the specific crypto suites. And the help I would like is I need somebody to go and try and see if they can reproduce those because it's not a test specture and it's not a official until we've had somebody else verify that they get the same results. And so that's where we are now. So, the document has been updated a lot. We have sections that still need to be done like our security sections and our privacy sections. Those should be similar to what we've done in other crypto suites but updated and taking into considerations the postquantum type suites. and that's where we are. things have changed a lot in the last couple months because like I said these specs are mature. 00:40:00 Greg Bernstein: There are third-party implementations of the signatures themselves. We've got open source code I posted for the test vectors that people can try and if you guys want at a future time we can walk through the spec and the test vectors and it's interesting to see the compromises we get from the different postquantum routines as far as key size, computational intensity, signature size and things like that. Sorry to take so much time, but lots gone on that. Mahmoud Alkhraishi: No. I think we can hold you to that presentation, Greg. If you're up for it,… Greg Bernstein: I mean,… Mahmoud Alkhraishi: I'll reach out after we can try and schedule something. Greg Bernstein: okay, because it's okay. Great. Mahmoud Alkhraishi: That sounds super interesting. Awesome. does anyone have anything else they'd like to add on this topic? Anything else they want to bring up? All right. the VC delivery test suites,… Mahmoud Alkhraishi: I believe, Ben, these are done and they've been static for a while. Is that true? Benjamin Young: Yeah, the test suites have not changed much in the last six months besides a few library upgrades. Benjamin Young: Probably one bit of news here is more related to canibc.com which we're working with the W3C to sort of shift that from a digital bizaar project on behalf of the community into the W3C as a fully open source code project which is kind of a new space for the W3C. which may sound odd to those of you who've worked on test suites because those do typically get coded within the W3C but as an organization it policies and procedures only really govern standards. So open source code including the test suites is kind of a mixed bag of how it's been approached. Benjamin Young: So, we're working with the W3C over the next few months to try and create more policies and governance process around code specifically. And then the hope is to bring canibc.com fully into AW3C space for governance. that might be an existing CG, that might be a dedicated one. and that group ostensibly would also help with or at least inform the future of related test suites like the ones you see here or the ones on the other slides. So, that's bigish news. Mahmoud Alkhraishi: Awesome. That's super interesting and… Benjamin Young: It's nothing final, but it's been in the works and it's work that's accelerating now that people are realizing it's 2026. not a lot. Mahmoud Alkhraishi: hopefully it works out. has there been any change for the implement side? Benjamin Young: We have lost a few who basically just stopped maintaining their public endpoints. and there's a few that probably need cleaning out because they likewise haven't either updated their integrations or they were side projects clearly that somebody was just doing and wanting to promote and then lost interest. but the core names that have been there from the beginning are still there, which is pretty much everyone you see on this tech. Benjamin Young: Mahmoud Alkhraishi: Okay. … Mahmoud Alkhraishi: do you think there's probably not going to be another push for any of these until the current work is going to close out, All the Benjamin Young: So, yeah. So my hope and really expectation from the working group and you've heard some of this from Greg already is that people will take test vectors more seriously earlier because it does not have to be a dead sprint in the last three we hours of the working group and if you do it throughout the process it's much healthier both for the spec and the tests because the tests are meant to inform the specificationability in that specs can often be written with musts and shoulds and whatever that are actually untestable and… 00:45:00 Benjamin Young: that coming to light earlier can help shape the spec test dynamic from the beginning. So in answer to your question,… Mahmoud Alkhraishi: Mhm. That makes sense. Benjamin Young: once the working group is officially back up and running for 2026, then my hope is towards TAC, we can start in the fall, we can start having conversations about who's leading which effort in for which spec around test suites and start getting some of that scaffolding up and running and then tests being run into 2027. Mahmoud Alkhraishi: Does anyone have anything else they'd like to add about the test suites or the implementations? All right. I think this is the same thing, right? Mahmoud Alkhraishi: I'm just gonna move forward and then are you. okay. Benjamin Young: Yeah. So this one,… Benjamin Young: yeah, most well should take this one,… Mahmoud Alkhraishi: Is this you? Benjamin Young: but the other slide. Yeah, it's more Will Abramson: Yeah yeah yeah yeah yeah I am on yeah this just really a flag to anyone on this call and… Mahmoud Alkhraishi: Are you one? Yeah. Will Abramson: anyone that you might know in your networks who has an implementation of a bid resolver that they want to check and demonstrate is conformant with the new did resolution spec. So we've got a first pass of the test suite. Currently there's two implementations integrated. That's the diff universal resolver and then I think digital bazar has an old implementation that they are going to get up to date because it's not passing the current test. so that to add your implementation the first thing you need is like a HTTPS endpoint that's public that can execute the resolution request. Will Abramson: So either you're an implement who already has this available and it's public and then submitting your implementation is very simple. You go to this VC test suite and add a JSON file to represent your implementation and provide some did that we can test and validate against your did resolver. We don't care what did method you resolve. As long as you can successfully execute a resolution request that takes in a did and returns a conformant resolution result,… Will Abramson: then you are a conformant did resolver. And that's great. Mahmoud Alkhraishi: Is there a minimum two dids resolve or… Will Abramson: We would love to Currently for us,… Mahmoud Alkhraishi: something or is it just any one did resolution works is Will Abramson: yeah, it's just any did. I mean, you can provide more than one DID, of course, that would be useful. And we also ask if you can provide some DIDs that fail because one of the important things we want to test is all the error cases. so you need to tell us which maybe it's a did key, but a DID key that doesn't have a proper key encoded, for example. obviously they're kind of individual depending on the DID method. Will Abramson: Yeah, and then the other question the other thing is… Mahmoud Alkhraishi: That All right. Will Abramson: if you have a DID resolution did resolver implementation that's just a library. currently there's no way to add that to the resolver unless you can create a wrapper that is like a HTTPS endpoint that you're willing to stand up. I think the work to actually do that if you have a resolver library that is conformant and you should take less than an hour's work I would be happy to help anybody who thinks they have a library that would want would like to do Mahmoud Alkhraishi: Thank you all. so please if you have a resolver, reach out and submit your resolvers to this test suite. Mahmoud Alkhraishi: VC education. do we have anyone on from there? Mahmoud Alkhraishi: Is it Dimmitri? Are you Yep. Dmitri Zagidulin: So I can speak to that a little bit. Dmitri Zagidulin: So VC education is essentially at a good stopping point. So we founded it a number of years ago. one of the primary motivations was shephering the transition of the open badges standard from the just plain website hosted v2 to a verifiable credentialsbased v3. So the vci task force was instrumental in sort of advising and guiding that transition. Dmitri Zagidulin: and then later on helped to organize and run interoperability plug fests where we demonstrated essentially credential wallets using W3C verifiable credentials as well as the protocols like VCOM open ID and didcom and make sure of interoperability between the wallets. we've held a lot of sort of general purpose education seminars used as a test bed for some of the other topics that we're working on in this group such as render method such as the verified identifiers and verifiers so we're at a point where I think we've reached enough of the goals that we're looking to hand 00:50:00 Dmitri Zagidulin: to fold the task force back into the CCG in general. So we reached out to the chairs and… Mahmoud Alkhraishi: All right. Dmitri Zagidulin: continuing that conversation and… Mahmoud Alkhraishi: And we're more than happy to help. Let's get back. Wonderful. Dmitri Zagidulin: and the year-long project with the DCC and unissue registry that concluded and shipped credential engine is running an issue registry currently and so on. Yeah. Mahmoud Alkhraishi: Did link resources is anchor Alex are you guys on? thanks and we have reached out. I don't think I've heard anything from them. does anyone know any news on this? Dmitri Zagidulin: I know a little bit in the sense that part of it slightly intersects with the did URL path handling work that's happening in the did working group that sort of bubbled out of the diff web VH working group. so Alex and Anker were part of that conversation. but I'm not sure what the current intention is. Mahmoud Alkhraishi: all Does anyone else have any other updates they have on Anything else All right. proposed work items and areas of focus. Does anyone have anything they'd like to So, I know we're a little bit short on time. There's sevenish minutes left. Are there any proposed work items that anybody has, anything that they want to talk about? Are there any areas that we want the CCG to focus on specifically? Any work items that you wish existed or things that you want to point people and say "Hey, there's probably a gap here. We should probably target it." Does anyone have anything along those lines they want to bring up? Mahmoud Alkhraishi: I mean, I know we have a lot already, so it's a little bit of a funny question to ask, but yeah. M Manu Sporny: I'll mention that we are seeing a pretty significant uptick with other standards bodies adopting the W3C verifiable credential work and kind of doing work elsewhere. which is I think a super healthy sign. so for example I've heard of the vital records community doing that. there are a number of states that have done that. the retail sector is very heavily leaning into W3C verifiable credentials. seeing some uptick in banking and finance as well as some pretty exciting new education things happening this year. Manu Sporny: and of course Steve Capel and the UNP work so the UN transparency protocol the business registry stuff European Union digital product passport and European business wallet stuff they're bringing that to W3C. so I think one of the healthy signs here is people are doing this without us having to really be too involved and in different market verticals. So I think that's good. That's it. Mahmoud Alkhraishi: Thank you. Demetri. Dmitri Zagidulin: Yeah, I was wondering if there's any interest in the group to I know we mentioned it possibly last year, but now there's even more momentum behind it. I'm wondering if there's interest in two areas. one is using things like authorization capability, ZCAPS, which is one of the specs in the CCG or essentially to polish it up c, put together a new version and specifically the part of the reason why there's sort of renewed work there is the interest of storage, right? 00:55:00 Dmitri Zagidulin: now that we've got a more or less decent infrastructure for DIDs and verifiable credentials, wallets, building building applications with them and having standardized backends for those wallets, the problem space suggests something like a standardized readr API using ZCAPS as authorization. So I was wondering if there's interest in this group in storage in Zcap's work essentially Mahmoud Alkhraishi: Phil, I know you're on the cube, but does anyone have anything they want to respond to me? Do we have any Nice. Manu Sporny: Yeah, I mean huge interest from us specifically digital bizaar specifically in that we've rolled some of this stuff out in production and we really would like to see kind of standards around it. I think it's really important for the interoperability story and the no vendor lock story. everything that she said Demetri so we are very very supportive would love to help and participate in that work noting how horribly spread thin we are with the current upcoming BCWG work items so we certainly can't lead the work but would be very happy to try and join and help if we Mahmoud Alkhraishi: Nice. no. Phillip Long: And I'm not going to suggest something that's new work, but rather to expand a little bit on what Manu said earlier about other groups taking advantage of the W3C framework and credentiing environments that have been done so far and that particularly includes one edtech which is focused on education credentials. Demetri mentioned that there was a transition to the badge from version two to version three that was primarily done within one edtech but to be conformant with W3C as an overall envelope for consistency and interoperability. Phillip Long: they've done the same thing with their work with the transcript what they call the comprehensive learner record version two and now there's emerging in the open a trusted credential profile which is intended to make a version of a resume available in a way that's conformant with W3C. So I just emphasize that the work is being done elsewhere but people are looking to W3C as an envelope and larger Mahmoud Alkhraishi: And thank you to everybody else who helped today. Thank you to all people who are contributing to CCG. If anyone has anything else they want to bring up, any other ideas, any other areas of focus, please don't hesitate to reach out to the mailing list. I'm sure if you reach out there, you'll get a broader audience than what you get from this call. And hopefully you can get some volunteers to help you focus on whatever new work item or area you'd like to work on. but again, thank you everyone today and have a great rest of your week. Meeting ended after 00:59:34 👋 *This editable transcript was computer generated and might contain errors. People can also change the text after it was created.*
Received on Wednesday, 11 March 2026 13:52:06 UTC