diff --git a/data/Credential-Format/ACDC-(KERI).json b/data/Credential-Format/ACDC-(KERI).json index 11299b0..a4285e2 100644 --- a/data/Credential-Format/ACDC-(KERI).json +++ b/data/Credential-Format/ACDC-(KERI).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "ACDC", "Specification": "https://trustoverip.github.io/tswg-acdc-specification/", "Standardization (Body, Process)": "", diff --git a/data/Credential-Format/AnonCred.json b/data/Credential-Format/AnonCred.json index 6ded957..fd0e248 100644 --- a/data/Credential-Format/AnonCred.json +++ b/data/Credential-Format/AnonCred.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "AnonCred", "Implementation Support": "https://github.com/hyperledger/anoncreds-rs", "Specification": "https://hyperledger.github.io/anoncreds-spec/", diff --git a/data/Credential-Format/CESR-CESR-Proof.json b/data/Credential-Format/CESR-CESR-Proof.json index a191fcb..c216b96 100644 --- a/data/Credential-Format/CESR-CESR-Proof.json +++ b/data/Credential-Format/CESR-CESR-Proof.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "CESR/CESR Proof", "Specification": "https://www.ietf.org/archive/id/draft-pfeairheller-cesr-proof-00.html", "Standardization (Body, Process)": "IETF (intention to go to Blockchain WG)", diff --git a/data/Credential-Format/CWT.json b/data/Credential-Format/CWT.json index f28b5b3..a1326ad 100644 --- a/data/Credential-Format/CWT.json +++ b/data/Credential-Format/CWT.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "CWT", "Specification": "https://www.rfc-editor.org/rfc/rfc8392.html", "Standardization (Body, Process)": "IETF", diff --git a/data/Credential-Format/Gordian-Envelope.json b/data/Credential-Format/Gordian-Envelope.json index e73b0f4..1e3678a 100644 --- a/data/Credential-Format/Gordian-Envelope.json +++ b/data/Credential-Format/Gordian-Envelope.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "Gordian Envelope", "Implementation Support": "command-line MVP https://github.com/BlockchainCommons/envelope-cli-swift", "IPR Policy": "SPDI:BSD-2-Clause-Patent https://spdx.org/licenses/BSD-2-Clause-Patent.html", diff --git a/data/Credential-Format/ICAO-DTC.json b/data/Credential-Format/ICAO-DTC.json index 344a4ea..47f94d9 100644 --- a/data/Credential-Format/ICAO-DTC.json +++ b/data/Credential-Format/ICAO-DTC.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "ICAO DTC", "Standardization (Body, Process)": "ICAO", "Selective Disclosure": true diff --git a/data/Credential-Format/Idemix-attribute-based-credential.json b/data/Credential-Format/Idemix-attribute-based-credential.json index 7bc58fa..5297c52 100644 --- a/data/Credential-Format/Idemix-attribute-based-credential.json +++ b/data/Credential-Format/Idemix-attribute-based-credential.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "Idemix attribute-based credential", "Implementation Support": "https://github.com/privacybydesign/gabi (cryptography), https://github.com/privacybydesign/irmago (semantics, wallet, servers, more)", "Specification": "None. Protocol documented here: https://irma.app/docs/irma-protocol", diff --git a/data/Credential-Format/JWP.json b/data/Credential-Format/JWP.json index 262a6b3..06f3f1c 100644 --- a/data/Credential-Format/JWP.json +++ b/data/Credential-Format/JWP.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "JWP", "Specification": "https://github.com/json-web-proofs/json-web-proofs", "Standardization (Body, Process)": "DIF", diff --git a/data/Credential-Format/JWT-VC.json b/data/Credential-Format/JWT-VC.json index fd7408e..934597b 100644 --- a/data/Credential-Format/JWT-VC.json +++ b/data/Credential-Format/JWT-VC.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "JWT-VC", "Rich Schemas-Semantic": false, "Crypto Agility": true, diff --git a/data/Credential-Format/JWT.json b/data/Credential-Format/JWT.json index c944a34..26977aa 100644 --- a/data/Credential-Format/JWT.json +++ b/data/Credential-Format/JWT.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "JWT", "Implementation Support": "https://jwt.io/libraries", "IPR Policy": "https://trustee.ietf.org/documents/trust-legal-provisions/", diff --git a/data/Credential-Format/LDP-VC.json b/data/Credential-Format/LDP-VC.json index 7b0f3a8..0fa73ed 100644 --- a/data/Credential-Format/LDP-VC.json +++ b/data/Credential-Format/LDP-VC.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "LDP-VC", "Implementation Support": "https://github.com/digitalbazaar/jsonld.js", "IPR Policy": "https://www.w3.org/Consortium/Patent-Policy-20200915/#sec-Requirements", diff --git a/data/Credential-Format/MDOC.json b/data/Credential-Format/MDOC.json index 03063de..af18aaa 100644 --- a/data/Credential-Format/MDOC.json +++ b/data/Credential-Format/MDOC.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "MDOC", "Specification": "ISO 18013-5", "Standardization (Body, Process)": "ISO", diff --git a/data/Credential-Format/SD-JWT-VC.json b/data/Credential-Format/SD-JWT-VC.json index 6feabf1..2c7ef99 100644 --- a/data/Credential-Format/SD-JWT-VC.json +++ b/data/Credential-Format/SD-JWT-VC.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "SD-JWT-VC", "IPR Policy": "https://trustee.ietf.org/documents/trust-legal-provisions/", "Specification": "https://datatracker.ietf.org/doc/html/draft-terbu-oauth-sd-jwt-vc", diff --git a/data/Credential-Format/SD-JWT.json b/data/Credential-Format/SD-JWT.json index f517600..5920cd5 100644 --- a/data/Credential-Format/SD-JWT.json +++ b/data/Credential-Format/SD-JWT.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "SD-JWT", "Implementation Support": "https://github.com/oauthstuff/draft-selective-disclosure-jwt#implementations", "IPR Policy": "https://trustee.ietf.org/documents/trust-legal-provisions/", diff --git a/data/Credential-Format/VC-(1.1).json b/data/Credential-Format/VC-(1.1).json index cccc908..7dcae97 100644 --- a/data/Credential-Format/VC-(1.1).json +++ b/data/Credential-Format/VC-(1.1).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "VC (1.1)", "Implementation Support": "https://jwt.io/libraries", "IPR Policy": "https://www.w3.org/Consortium/Patent-Policy-20200915/#sec-Requirements", diff --git a/data/Credential-Format/x509.json b/data/Credential-Format/x509.json index b672e33..77db8cf 100644 --- a/data/Credential-Format/x509.json +++ b/data/Credential-Format/x509.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Format.json", + "$schema": "../../schemas/credential-format.json", "Name": "x509", "Standardization (Body, Process)": "ITUT", "Encoding Scheme": "ASN.1", diff --git a/data/Credential-Profile/AnonCreds-cardano.json b/data/Credential-Profile/AnonCreds-cardano.json index 4ab9989..706aaef 100644 --- a/data/Credential-Profile/AnonCreds-cardano.json +++ b/data/Credential-Profile/AnonCreds-cardano.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "AnonCreds with cardano blockchain", "Credential Profile Description": "AnonCreds with cardano blockchain", "Credential Format": "AnonCred", diff --git a/data/Credential-Profile/AnonCreds-cheqd.json b/data/Credential-Profile/AnonCreds-cheqd.json index f6a1dcc..3d33d08 100644 --- a/data/Credential-Profile/AnonCreds-cheqd.json +++ b/data/Credential-Profile/AnonCreds-cheqd.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "AnonCreds with did:cheqd", "Credential Profile Description": "AnonCreds with did:cheqd", "Credential Format": "AnonCred", diff --git a/data/Credential-Profile/AnonCreds-indy.json b/data/Credential-Profile/AnonCreds-indy.json index e4cb4eb..a288b86 100644 --- a/data/Credential-Profile/AnonCreds-indy.json +++ b/data/Credential-Profile/AnonCreds-indy.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "AnonCreds with did:indy", "Credential Profile Description": "Well-known default profile in all Hyperledger Indy implementations. A favoured profile due to selective disclosure and predicate capability as well as privacy-preserving revocation mechanism. Standardization in community spec in progress (July 2022).", "Credential Format": "AnonCred", diff --git a/data/Credential-Profile/AnonCreds-web.json b/data/Credential-Profile/AnonCreds-web.json index 4f30b77..f603d4b 100644 --- a/data/Credential-Profile/AnonCreds-web.json +++ b/data/Credential-Profile/AnonCreds-web.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "AnonCreds with did:web", "Credential Profile Description": "AnonCreds with did:web", "Credential Format": "AnonCred", diff --git a/data/Credential-Profile/DIIP.json b/data/Credential-Profile/DIIP.json index 96ec870..1a6dae2 100644 --- a/data/Credential-Profile/DIIP.json +++ b/data/Credential-Profile/DIIP.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "Decentralized Identity Interop Profile", "Formal Specification": "https://dutchblockchaincoalition.github.io/DIIP/", "Credential Profile Description": "Decentralized Identity Interop Profile", diff --git a/data/Credential-Profile/EBSI.json b/data/Credential-Profile/EBSI.json index aa9a9b4..e67523f 100644 --- a/data/Credential-Profile/EBSI.json +++ b/data/Credential-Profile/EBSI.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "EBSI", "Credential Profile Description": "[Profile description goes here]", "Credential Format": "JWT-VC", diff --git a/data/Credential-Profile/HAIP.json b/data/Credential-Profile/HAIP.json index c667524..99088b5 100644 --- a/data/Credential-Profile/HAIP.json +++ b/data/Credential-Profile/HAIP.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "HAIP", "Credential Profile Description": "OpenID4VC High Assurance Interoperability Profile with SD-JWT-VC", "Formal Specification": "https://vcstuff.github.io/oid4vc-haip-sd-jwt-vc/draft-oid4vc-haip-sd-jwt-vc.html#name-authors-addresses", diff --git a/data/Credential-Profile/ICAO-DTC.json b/data/Credential-Profile/ICAO-DTC.json index 17656e5..6695134 100644 --- a/data/Credential-Profile/ICAO-DTC.json +++ b/data/Credential-Profile/ICAO-DTC.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "ICAO DTC", "Credential Profile Description": "[Profile description goes here]", "Credential Format": "ICAO DTC", diff --git a/data/Credential-Profile/IRMA-(Yivi)-wallet.json b/data/Credential-Profile/IRMA-(Yivi)-wallet.json index 7298413..1f147a8 100644 --- a/data/Credential-Profile/IRMA-(Yivi)-wallet.json +++ b/data/Credential-Profile/IRMA-(Yivi)-wallet.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "IRMA (Yivi) wallet", "Credential Profile Description": "https://dominoweb.draco.res.ibm.com/reports/rz3730_revised.pdf", "Credential Format": "Idemix attribute-based credential", diff --git a/data/Credential-Profile/ISO-mDL.json b/data/Credential-Profile/ISO-mDL.json index 5b44d17..22fb59d 100644 --- a/data/Credential-Profile/ISO-mDL.json +++ b/data/Credential-Profile/ISO-mDL.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "ISO mDL", "Credential Profile Description": "[Profile description goes here]", "Credential Format": "MDOC", diff --git a/data/Credential-Profile/JFFLabs-x-VC-EDU-PlugFest2-(LDP).json b/data/Credential-Profile/JFFLabs-x-VC-EDU-PlugFest2-(LDP).json index 864a9be..cd28ced 100644 --- a/data/Credential-Profile/JFFLabs-x-VC-EDU-PlugFest2-(LDP).json +++ b/data/Credential-Profile/JFFLabs-x-VC-EDU-PlugFest2-(LDP).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "JFFLabs x VC-EDU PlugFest2 (LDP)", "Credential Profile Description": "Interoperability profile used in the PlugFest2", "Credential Format": "JWT-VC", diff --git a/data/Credential-Profile/JFFLabs-x-VC-EDU-PlugFest2-(VC).json b/data/Credential-Profile/JFFLabs-x-VC-EDU-PlugFest2-(VC).json index b6d2921..9aec04a 100644 --- a/data/Credential-Profile/JFFLabs-x-VC-EDU-PlugFest2-(VC).json +++ b/data/Credential-Profile/JFFLabs-x-VC-EDU-PlugFest2-(VC).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "JFFLabs x VC-EDU PlugFest2 (VC)", "Credential Profile Description": "Interoperability profile used in the PlugFest2", "Credential Format": "LDP-VC", diff --git a/data/Credential-Profile/JSON-LD-VCs-with-BBS-(Credential-is-Secret).json b/data/Credential-Profile/JSON-LD-VCs-with-BBS-(Credential-is-Secret).json index b98f46e..2428d43 100644 --- a/data/Credential-Profile/JSON-LD-VCs-with-BBS-(Credential-is-Secret).json +++ b/data/Credential-Profile/JSON-LD-VCs-with-BBS-(Credential-is-Secret).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "JSON-LD VCs with BBS (Credential is Secret)", "Credential Profile Description": "[Profile description goes here]", "Credential Format": "LDP-VC", diff --git a/data/Credential-Profile/JSON-LD-VCs-with-BBS-(Holder-DID).json b/data/Credential-Profile/JSON-LD-VCs-with-BBS-(Holder-DID).json index 43be482..bb8d252 100644 --- a/data/Credential-Profile/JSON-LD-VCs-with-BBS-(Holder-DID).json +++ b/data/Credential-Profile/JSON-LD-VCs-with-BBS-(Holder-DID).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "JSON-LD VCs with BBS (Holder DID)", "Credential Profile Description": "[Profile description goes here]", "Credential Format": "LDP-VC", diff --git a/data/Credential-Profile/JWT-VC-Presentation-Profile-2.json b/data/Credential-Profile/JWT-VC-Presentation-Profile-2.json index da793bc..b0bc710 100644 --- a/data/Credential-Profile/JWT-VC-Presentation-Profile-2.json +++ b/data/Credential-Profile/JWT-VC-Presentation-Profile-2.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "JWT VC Presentation Profile 2", "Credential Profile Description": "https://identity.foundation/jwt-vc-presentation-profile/", "Credential Format": "JWT-VC", diff --git a/data/Credential-Profile/JWT-VC-Presentation-Profile.json b/data/Credential-Profile/JWT-VC-Presentation-Profile.json index ca45725..e296dcd 100644 --- a/data/Credential-Profile/JWT-VC-Presentation-Profile.json +++ b/data/Credential-Profile/JWT-VC-Presentation-Profile.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "JWT VC Presentation Profile", "Credential Profile Description": "https://identity.foundation/jwt-vc-presentation-profile/", "Credential Format": "JWT-VC", diff --git a/data/Credential-Profile/NGI-Atlantic-for-OpenID4VCs.json b/data/Credential-Profile/NGI-Atlantic-for-OpenID4VCs.json index 7b8c9df..9a1bc70 100644 --- a/data/Credential-Profile/NGI-Atlantic-for-OpenID4VCs.json +++ b/data/Credential-Profile/NGI-Atlantic-for-OpenID4VCs.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "NGI Atlantic for OpenID4VCs", "Credential Profile Description": "https://ngiatlantic.info\nhttps://ngiatlantic.eu/funded-experiments/next-generation-ssi-standards", "Credential Format": "JWT-VC", diff --git a/data/Credential-Profile/SD-JWT-VCs-(w--X.509-for-Issuers).json b/data/Credential-Profile/SD-JWT-VCs-(w--X.509-for-Issuers).json index 7cd1f3b..c444fcd 100644 --- a/data/Credential-Profile/SD-JWT-VCs-(w--X.509-for-Issuers).json +++ b/data/Credential-Profile/SD-JWT-VCs-(w--X.509-for-Issuers).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "SD-JWT VCs (w/ X.509 for Issuers)", "Credential Profile Description": "[Profile description goes here]", "Credential Format": "SD-JWT-VC", diff --git a/data/Credential-Profile/x.509.json b/data/Credential-Profile/x.509.json index cd9263d..d9b86bd 100644 --- a/data/Credential-Profile/x.509.json +++ b/data/Credential-Profile/x.509.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Credential-Profile.json", + "$schema": "../../schemas/credential-profile.json", "Name": "x.509", "Credential Profile Description": "[Profile description goes here]", "Credential Format": "x509", diff --git a/data/Issuance-Protocol/ACDC.json b/data/Issuance-Protocol/ACDC.json index a915b47..5ba9262 100644 --- a/data/Issuance-Protocol/ACDC.json +++ b/data/Issuance-Protocol/ACDC.json @@ -1,4 +1,4 @@ { - "$schema": "../../schemas/Issuance-Protocol.json", + "$schema": "../../schemas/issuance-protocol.json", "Name": "ACDC" } diff --git a/data/Issuance-Protocol/ISO-23220-3.json b/data/Issuance-Protocol/ISO-23220-3.json index 0d77de2..b3d6f1d 100644 --- a/data/Issuance-Protocol/ISO-23220-3.json +++ b/data/Issuance-Protocol/ISO-23220-3.json @@ -1,4 +1,4 @@ { - "$schema": "../../schemas/Issuance-Protocol.json", + "$schema": "../../schemas/issuance-protocol.json", "Name": "ISO 23220-3" } diff --git a/data/Issuance-Protocol/Issue-Credential-v1.json b/data/Issuance-Protocol/Issue-Credential-v1.json index 556c941..5748108 100644 --- a/data/Issuance-Protocol/Issue-Credential-v1.json +++ b/data/Issuance-Protocol/Issue-Credential-v1.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Issuance-Protocol.json", + "$schema": "../../schemas/issuance-protocol.json", "Name": "Issue Credential v1", "Specification": "https://github.com/hyperledger/aries-rfcs/blob/main/features/0036-issue-credential/README.md" } diff --git a/data/Issuance-Protocol/Issue-Credential-v2.json b/data/Issuance-Protocol/Issue-Credential-v2.json index 277dae7..8ad2275 100644 --- a/data/Issuance-Protocol/Issue-Credential-v2.json +++ b/data/Issuance-Protocol/Issue-Credential-v2.json @@ -1,4 +1,4 @@ { - "$schema": "../../schemas/Issuance-Protocol.json", + "$schema": "../../schemas/issuance-protocol.json", "Name": "Issue Credential v2" } diff --git a/data/Issuance-Protocol/OpenID4VCI.json b/data/Issuance-Protocol/OpenID4VCI.json index 351e709..3442da8 100644 --- a/data/Issuance-Protocol/OpenID4VCI.json +++ b/data/Issuance-Protocol/OpenID4VCI.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Issuance-Protocol.json", + "$schema": "../../schemas/issuance-protocol.json", "Name": "OpenID4VCI", "Specification": "https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html" } diff --git a/data/Key-Management/.well-known-jwt-issuer.json b/data/Key-Management/.well-known-jwt-issuer.json index af11033..acc3ba4 100644 --- a/data/Key-Management/.well-known-jwt-issuer.json +++ b/data/Key-Management/.well-known-jwt-issuer.json @@ -1,4 +1,4 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": ".well-known/jwt-issuer" } diff --git a/data/Key-Management/cose-key.json b/data/Key-Management/cose-key.json index 4624a89..7d83739 100644 --- a/data/Key-Management/cose-key.json +++ b/data/Key-Management/cose-key.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "cose key", "Implementation Support": "https://www.rfc-editor.org/rfc/rfc9052.html" } diff --git a/data/Key-Management/credential-as-secret.json b/data/Key-Management/credential-as-secret.json index abf3e6f..a6d6434 100644 --- a/data/Key-Management/credential-as-secret.json +++ b/data/Key-Management/credential-as-secret.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "credential as secret", "Infrastructure for Key Resolution": false, "Key Rotation": false, diff --git a/data/Key-Management/did.cheqd.json b/data/Key-Management/did.cheqd.json index cc2ec18..96e7943 100644 --- a/data/Key-Management/did.cheqd.json +++ b/data/Key-Management/did.cheqd.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:cheqd", "Specification": "https://docs.cheqd.io/identity/architecture/adr-list/adr-001-cheqd-did-method", "Implementation Support": "https://docs.cheqd.io/identity/sdk/understanding-sdks", diff --git a/data/Key-Management/did.ebsi.json b/data/Key-Management/did.ebsi.json index ad4cdcd..458736b 100644 --- a/data/Key-Management/did.ebsi.json +++ b/data/Key-Management/did.ebsi.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:ebsi", "Implementation Support": "https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/EBSI+DID+Method", "Infrastructure for Key Resolution": { diff --git a/data/Key-Management/did.indy.json b/data/Key-Management/did.indy.json index ca9177e..0a13da9 100644 --- a/data/Key-Management/did.indy.json +++ b/data/Key-Management/did.indy.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:indy", "Implementation Support": "https://hyperledger.github.io/indy-did-method/", "Infrastructure for Key Resolution": { diff --git a/data/Key-Management/did.ion-(long-form).json b/data/Key-Management/did.ion-(long-form).json index 6d719b1..c6a0334 100644 --- a/data/Key-Management/did.ion-(long-form).json +++ b/data/Key-Management/did.ion-(long-form).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:ion (long form)", "Implementation Support": "https://github.com/decentralized-identity/ion", "Infrastructure for Key Resolution": false, diff --git a/data/Key-Management/did.ion-(short-form).json b/data/Key-Management/did.ion-(short-form).json index 81a8426..88f7342 100644 --- a/data/Key-Management/did.ion-(short-form).json +++ b/data/Key-Management/did.ion-(short-form).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:ion (short form)", "Infrastructure for Key Resolution": true, "Key Rotation": true, diff --git a/data/Key-Management/did.jwk.json b/data/Key-Management/did.jwk.json index 840b198..dadb29a 100644 --- a/data/Key-Management/did.jwk.json +++ b/data/Key-Management/did.jwk.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:jwk", "Party": ["holder", "issuer"] } diff --git a/data/Key-Management/did.keri.json b/data/Key-Management/did.keri.json index e57fd95..bbbe270 100644 --- a/data/Key-Management/did.keri.json +++ b/data/Key-Management/did.keri.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:keri", "Implementation Support": "https://weboftrust.github.io/did-keri/", "Infrastructure for Key Resolution": { diff --git a/data/Key-Management/did.key.json b/data/Key-Management/did.key.json index 4fbc7ca..6691ab7 100644 --- a/data/Key-Management/did.key.json +++ b/data/Key-Management/did.key.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:key", "Implementation Support": "https://w3c-ccg.github.io/did-method-key/", "Infrastructure for Key Resolution": false, diff --git a/data/Key-Management/did.peer.json b/data/Key-Management/did.peer.json index fc7d021..82db667 100644 --- a/data/Key-Management/did.peer.json +++ b/data/Key-Management/did.peer.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:peer", "Implementation Support": "https://identity.foundation/peer-did-method-spec/index.html", "Party": ["holder"] diff --git a/data/Key-Management/did.web.json b/data/Key-Management/did.web.json index 61742eb..0346442 100644 --- a/data/Key-Management/did.web.json +++ b/data/Key-Management/did.web.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "did:web", "Implementation Support": "https://github.com/w3c-ccg/did-method-web", "Infrastructure for Key Resolution": { diff --git a/data/Key-Management/jwks_uri.json b/data/Key-Management/jwks_uri.json index 7c5ce51..5fcc934 100644 --- a/data/Key-Management/jwks_uri.json +++ b/data/Key-Management/jwks_uri.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "jwks_uri", "Infrastructure for Key Resolution": { "Value": true, diff --git a/data/Key-Management/link-secrets.json b/data/Key-Management/link-secrets.json index 1c8d6c2..6280a03 100644 --- a/data/Key-Management/link-secrets.json +++ b/data/Key-Management/link-secrets.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "link secrets", "Infrastructure for Key Resolution": false, "Key Rotation": false, diff --git a/data/Key-Management/pub-key-in-X.509-cert.json b/data/Key-Management/pub-key-in-X.509-cert.json index c5e3675..9dab762 100644 --- a/data/Key-Management/pub-key-in-X.509-cert.json +++ b/data/Key-Management/pub-key-in-X.509-cert.json @@ -1,4 +1,4 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "pub key in X.509 cert" } diff --git a/data/Key-Management/raw-public-keys-(jwk).json b/data/Key-Management/raw-public-keys-(jwk).json index 614ac33..4ed2fc7 100644 --- a/data/Key-Management/raw-public-keys-(jwk).json +++ b/data/Key-Management/raw-public-keys-(jwk).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "raw public keys (jwk)", "Implementation Support": "https://www.rfc-editor.org/rfc/rfc7517", "IPR Policy": "https://trustee.ietf.org/documents/trust-legal-provisions/", diff --git a/data/Key-Management/raw-public-keys-(none-jwk).json b/data/Key-Management/raw-public-keys-(none-jwk).json index b56193d..42130ad 100644 --- a/data/Key-Management/raw-public-keys-(none-jwk).json +++ b/data/Key-Management/raw-public-keys-(none-jwk).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Key-Management.json", + "$schema": "../../schemas/key-management.json", "Name": "raw public keys (none jwk)", "Infrastructure for Key Resolution": false, "Key Rotation": false, diff --git a/data/Presentation-Protocol/OpenID4VP.json b/data/Presentation-Protocol/OpenID4VP.json index 88b699c..99cceb9 100644 --- a/data/Presentation-Protocol/OpenID4VP.json +++ b/data/Presentation-Protocol/OpenID4VP.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Presentation-Protocol.json", + "$schema": "../../schemas/presentation-protocol.json", "Name": "OpenID4VP", "Specification": "https://openid.net/specs/openid-4-verifiable-presentations-1_0.html" } diff --git a/data/Presentation-Protocol/Present-Proof-v2.json b/data/Presentation-Protocol/Present-Proof-v2.json index 0695e49..d78732a 100644 --- a/data/Presentation-Protocol/Present-Proof-v2.json +++ b/data/Presentation-Protocol/Present-Proof-v2.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Presentation-Protocol.json", + "$schema": "../../schemas/presentation-protocol.json", "Name": "Present Proof v2", "Specification": "https://hyperledger.github.io/aries-rfcs/latest/aip2/0454-present-proof-v2" } diff --git a/data/Presentation-Protocol/PresentProof-v1.0.json b/data/Presentation-Protocol/PresentProof-v1.0.json index 42ffad7..cff7d97 100644 --- a/data/Presentation-Protocol/PresentProof-v1.0.json +++ b/data/Presentation-Protocol/PresentProof-v1.0.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Presentation-Protocol.json", + "$schema": "../../schemas/presentation-protocol.json", "Name": "Present Proof v1.0", "Specification": "https://github.com/hyperledger/aries-rfcs/blob/main/features/0037-present-proof/README.md" } diff --git a/data/Signing-Algorithm/BBS+-with-public-key-binding.json b/data/Signing-Algorithm/BBS+-with-public-key-binding.json index 5ddfce4..e8219fb 100644 --- a/data/Signing-Algorithm/BBS+-with-public-key-binding.json +++ b/data/Signing-Algorithm/BBS+-with-public-key-binding.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Signing-Algorithm.json", + "$schema": "../../schemas/signing-algorim.json", "Name": "BBS+ with public key binding", "Implementation Support": "https://github.com/mattrglobal/bbs-signatures", "Specification": "https://datatracker.ietf.org/doc/draft-looker-cfrg-bbs-signatures/", diff --git a/data/Signing-Algorithm/BoundBBS+.json b/data/Signing-Algorithm/BoundBBS+.json index e7bb52f..771a355 100644 --- a/data/Signing-Algorithm/BoundBBS+.json +++ b/data/Signing-Algorithm/BoundBBS+.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Signing-Algorithm.json", + "$schema": "../../schemas/signing-algorim.json", "Name": "BoundBBS+", "IPR Policy": "barely", "Standardization (Body, Process)": "DIF (intention to transfer to IRTF CFRG)", diff --git a/data/Signing-Algorithm/CL.json b/data/Signing-Algorithm/CL.json index 11018a7..8c8b8b9 100644 --- a/data/Signing-Algorithm/CL.json +++ b/data/Signing-Algorithm/CL.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Signing-Algorithm.json", + "$schema": "../../schemas/signing-algorim.json", "Name": "CL", "Implementation Support": "Hyperledger Ursa, https://github.com/privacybydesign/gabi ", "Specification": "CL-Signatures of there own do not have a formal specification, that is included in Anoncreds", diff --git a/data/Signing-Algorithm/ECDSA.json b/data/Signing-Algorithm/ECDSA.json index 0ea2ddf..e4578f5 100644 --- a/data/Signing-Algorithm/ECDSA.json +++ b/data/Signing-Algorithm/ECDSA.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Signing-Algorithm.json", + "$schema": "../../schemas/signing-algorim.json", "Name": "ECDSA", "Implementation Support": "many mature implementations", "Specification": "X9.62-2005", diff --git a/data/Signing-Algorithm/EdDSA.json b/data/Signing-Algorithm/EdDSA.json index d6899fb..721af86 100644 --- a/data/Signing-Algorithm/EdDSA.json +++ b/data/Signing-Algorithm/EdDSA.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Signing-Algorithm.json", + "$schema": "../../schemas/signing-algorim.json", "Name": "EdDSA", "Implementation Support": "many mature implementations", "Recognition by government authorities (NIST, BSI, ...)": { diff --git a/data/Signing-Algorithm/PS.json b/data/Signing-Algorithm/PS.json index 8127669..2292148 100644 --- a/data/Signing-Algorithm/PS.json +++ b/data/Signing-Algorithm/PS.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Signing-Algorithm.json", + "$schema": "../../schemas/signing-algorim.json", "Name": "PS", "Implementation Support": "Hyperledger Anoncreds, https://github.com/hyperledger/anoncreds-v2-rs ", "Specification": "PS-Signatures of there own do not have a formal specification, that is included in Anoncreds-V2", diff --git a/data/Signing-Algorithm/RSA.json b/data/Signing-Algorithm/RSA.json index b8a732b..5b6543b 100644 --- a/data/Signing-Algorithm/RSA.json +++ b/data/Signing-Algorithm/RSA.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Signing-Algorithm.json", + "$schema": "../../schemas/signing-algorim.json", "Name": "RSA", "Implementation Support": "many mature implementations", "Recognition by government authorities (NIST, BSI, ...)": { diff --git a/data/Signing-Algorithm/Schnorr.json b/data/Signing-Algorithm/Schnorr.json index 26b4611..8a3c6d7 100644 --- a/data/Signing-Algorithm/Schnorr.json +++ b/data/Signing-Algorithm/Schnorr.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Signing-Algorithm.json", + "$schema": "../../schemas/signing-algorim.json", "Name": "Schnorr", "Implementation Support": "many mature implementations", "IPR Policy": "patents expired", diff --git a/data/Status-Algorithm/BBF18-cryptographic-accumulator-based-on-RSA.json b/data/Status-Algorithm/BBF18-cryptographic-accumulator-based-on-RSA.json index fb3c843..2fdf164 100644 --- a/data/Status-Algorithm/BBF18-cryptographic-accumulator-based-on-RSA.json +++ b/data/Status-Algorithm/BBF18-cryptographic-accumulator-based-on-RSA.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "BBF18-cryptographic accumulator based on RSA", "Recognition by government authorities (NIST, BSI, ...)": false, "Category": "Accumulator", diff --git a/data/Status-Algorithm/CRL-certificate-revocation-list.json b/data/Status-Algorithm/CRL-certificate-revocation-list.json index bffb7c8..2eb6c42 100644 --- a/data/Status-Algorithm/CRL-certificate-revocation-list.json +++ b/data/Status-Algorithm/CRL-certificate-revocation-list.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "CRL - certificate revocation list", "Recognition by government authorities (NIST, BSI, ...)": true, "Category": "Deny-List", diff --git a/data/Status-Algorithm/Indy-Revocation.json b/data/Status-Algorithm/Indy-Revocation.json index 6bf69cc..9bc4c1f 100644 --- a/data/Status-Algorithm/Indy-Revocation.json +++ b/data/Status-Algorithm/Indy-Revocation.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "Indy Revocation", "Implementation Support": "Indy SDK", "Standardization (Body, Process)": "AnonCreds", diff --git a/data/Status-Algorithm/JWT-CWT-status-list.json b/data/Status-Algorithm/JWT-CWT-status-list.json index 2a00b7d..b178146 100644 --- a/data/Status-Algorithm/JWT-CWT-status-list.json +++ b/data/Status-Algorithm/JWT-CWT-status-list.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "JWT/CWT status list", "Implementation Support": "https://github.com/vcstuff/draft-looker-oauth-jwt-cwt-status-list", "Specification": "https://datatracker.ietf.org/doc/draft-terbu-oauth-sd-jwt-vc/", diff --git a/data/Status-Algorithm/Non-Revocation-Token.json b/data/Status-Algorithm/Non-Revocation-Token.json index 2897c99..e606756 100644 --- a/data/Status-Algorithm/Non-Revocation-Token.json +++ b/data/Status-Algorithm/Non-Revocation-Token.json @@ -1,4 +1,4 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "Non-Revocation Token" } diff --git a/data/Status-Algorithm/RSA-B-cryptographic-accumulator-based-on-RSA.json b/data/Status-Algorithm/RSA-B-cryptographic-accumulator-based-on-RSA.json index f7e4d84..d402b85 100644 --- a/data/Status-Algorithm/RSA-B-cryptographic-accumulator-based-on-RSA.json +++ b/data/Status-Algorithm/RSA-B-cryptographic-accumulator-based-on-RSA.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "RSA-B - cryptographic accumulator based on RSA", "Implementation Support": "https://github.com/privacybydesign/gabi/tree/master/revocation", "Specification": "https://eprint.iacr.org/2017/043.pdf", diff --git a/data/Status-Algorithm/SLTD-database-(travel-and-identity-documents).json b/data/Status-Algorithm/SLTD-database-(travel-and-identity-documents).json index 4477c25..9783199 100644 --- a/data/Status-Algorithm/SLTD-database-(travel-and-identity-documents).json +++ b/data/Status-Algorithm/SLTD-database-(travel-and-identity-documents).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "SLTD database (travel and identity documents)", "Category": "Deny-List" } diff --git a/data/Status-Algorithm/Status-List-2021.json b/data/Status-Algorithm/Status-List-2021.json index 6b14b19..b29c2be 100644 --- a/data/Status-Algorithm/Status-List-2021.json +++ b/data/Status-Algorithm/Status-List-2021.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "Status List 2021", "Implementation Support": "https://github.com/transmute-industries/verifiable-data/tree/main/packages/vc-status-rl-2020", "Specification": "https://w3c-ccg.github.io/vc-status-list-2021/", diff --git a/data/Status-Algorithm/VB20-cryptographic-accumulator-based-on-pairings.json b/data/Status-Algorithm/VB20-cryptographic-accumulator-based-on-pairings.json index 9585957..4754981 100644 --- a/data/Status-Algorithm/VB20-cryptographic-accumulator-based-on-pairings.json +++ b/data/Status-Algorithm/VB20-cryptographic-accumulator-based-on-pairings.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "VB20 - cryptographic accumulator based on pairings", "Recognition by government authorities (NIST, BSI, ...)": false, "Category": "Accumulator", diff --git a/data/Status-Algorithm/Validity-Credential.json b/data/Status-Algorithm/Validity-Credential.json index ce819ec..b7cbc23 100644 --- a/data/Status-Algorithm/Validity-Credential.json +++ b/data/Status-Algorithm/Validity-Credential.json @@ -1,4 +1,4 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "Validity Credential" } diff --git a/data/Status-Algorithm/medium-term-expiration.json b/data/Status-Algorithm/medium-term-expiration.json index 9b01b7e..3424f66 100644 --- a/data/Status-Algorithm/medium-term-expiration.json +++ b/data/Status-Algorithm/medium-term-expiration.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "medium-term expiration", "Specification": "weeks" } diff --git a/data/Status-Algorithm/short-term-expiration.json b/data/Status-Algorithm/short-term-expiration.json index 0957549..0ea76b5 100644 --- a/data/Status-Algorithm/short-term-expiration.json +++ b/data/Status-Algorithm/short-term-expiration.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Status-Algorithm.json", + "$schema": "../../schemas/status-algorithm.json", "Name": "short-term expiration", "Specification": "minutes" } diff --git a/data/Trust-Management/EBSI-Trust-Registries.json b/data/Trust-Management/EBSI-Trust-Registries.json index 91325a5..b7b7819 100644 --- a/data/Trust-Management/EBSI-Trust-Registries.json +++ b/data/Trust-Management/EBSI-Trust-Registries.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Trust-Management.json", + "$schema": "../../schemas/trust-management.json", "Name": "EBSI Trust Registries", "Description": "Ledger-anchored trust registries" } diff --git a/data/Trust-Management/IRMA-(Yivi)-Schemes.json b/data/Trust-Management/IRMA-(Yivi)-Schemes.json index 1ecce5b..e4d9b25 100644 --- a/data/Trust-Management/IRMA-(Yivi)-Schemes.json +++ b/data/Trust-Management/IRMA-(Yivi)-Schemes.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Trust-Management.json", + "$schema": "../../schemas/trust-management.json", "Name": "IRMA (Yivi) Schemes", "Specification": "https://irma.app/docs/schemes/", "Description": "every issuer publishes its keys at a certain URL, the whole structure is signed by a trusted authority" diff --git a/data/Trust-Management/OpenID-Connect-Federation.json b/data/Trust-Management/OpenID-Connect-Federation.json index fa3a644..ebeba3e 100644 --- a/data/Trust-Management/OpenID-Connect-Federation.json +++ b/data/Trust-Management/OpenID-Connect-Federation.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Trust-Management.json", + "$schema": "../../schemas/trust-management.json", "Name": "OpenID Connect Federation", "Standardization (Body, Process)": "OpenID Foundation", "Specification": "https://openid.net/specs/openid-connect-federation-1_0.html", diff --git a/data/Trust-Management/TRAIN.json b/data/Trust-Management/TRAIN.json index 9fcc609..7e4e44e 100644 --- a/data/Trust-Management/TRAIN.json +++ b/data/Trust-Management/TRAIN.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Trust-Management.json", + "$schema": "../../schemas/trust-management.json", "Name": "TRAIN", "Implementation Support": "https://gitlab.cc-asp.fraunhofer.de/train", "IPR Policy": "Apache 2.0", diff --git a/data/Trust-Management/Trusted-Lists.json b/data/Trust-Management/Trusted-Lists.json index 3740826..8fb094f 100644 --- a/data/Trust-Management/Trusted-Lists.json +++ b/data/Trust-Management/Trusted-Lists.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Trust-Management.json", + "$schema": "../../schemas/trust-management.json", "Name": "Trusted Lists", "Standardization (Body, Process)": "ETSi", "Specification": "https://www.etsi.org/deliver/etsi_ts/119600_119699/119612/02.02.01_60/ts_119612v020201p.pdf", diff --git a/data/Trust-Management/Verified-issuer-certificate-authority-list-(VICAL).json b/data/Trust-Management/Verified-issuer-certificate-authority-list-(VICAL).json index fe4ef7a..f699939 100644 --- a/data/Trust-Management/Verified-issuer-certificate-authority-list-(VICAL).json +++ b/data/Trust-Management/Verified-issuer-certificate-authority-list-(VICAL).json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Trust-Management.json", + "$schema": "../../schemas/trust-management.json", "Name": "Verified issuer certificate authority list (VICAL)", "Specification": "ISO 18013-5, Annex C" } diff --git a/data/Trust-Management/Verifier-knows-Issuers.json b/data/Trust-Management/Verifier-knows-Issuers.json index 602e07f..fc6231e 100644 --- a/data/Trust-Management/Verifier-knows-Issuers.json +++ b/data/Trust-Management/Verifier-knows-Issuers.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Trust-Management.json", + "$schema": "../../schemas/trust-management.json", "Name": "Verifier knows Issuers", "Implementation Support": "Manual / bespoke", "IPR Policy": "None", diff --git a/data/Trust-Management/X.509-certificates.json b/data/Trust-Management/X.509-certificates.json index 3c2c776..6ecf090 100644 --- a/data/Trust-Management/X.509-certificates.json +++ b/data/Trust-Management/X.509-certificates.json @@ -1,5 +1,5 @@ { - "$schema": "../../schemas/Trust-Management.json", + "$schema": "../../schemas/trust-management.json", "Name": "X.509 certificates", "Implementation Support": "broadly available", "Description": "Trust is managed by way of attributes attested in the certificate (e.g. could be role of an issuer) in combination with trust chains. The ultimate entity in the chain is typically trust anchor recipients need to rely in. " diff --git a/schemas/Credential-Format.json b/schemas/Credential-Format.json index a715440..e649a19 100644 --- a/schemas/Credential-Format.json +++ b/schemas/Credential-Format.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Credential-Format.json", + "$id": "credential-format.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/schemas/Credential-Profile.json b/schemas/Credential-Profile.json index 25c6e70..0b6e57b 100644 --- a/schemas/Credential-Profile.json +++ b/schemas/Credential-Profile.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Credential-Profile.json", + "$id": "credential-profile.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/schemas/Issuance-Protocol.json b/schemas/Issuance-Protocol.json index c7531a0..52f5d21 100644 --- a/schemas/Issuance-Protocol.json +++ b/schemas/Issuance-Protocol.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Issuance-Protocol.json", + "$id": "issuance-protocol.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/schemas/Key-Management.json b/schemas/Key-Management.json index 83a1b30..4186999 100644 --- a/schemas/Key-Management.json +++ b/schemas/Key-Management.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Key-Management.json", + "$id": "key-management.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/schemas/Presentation-Protocol.json b/schemas/Presentation-Protocol.json index 45f9f20..04df1c0 100644 --- a/schemas/Presentation-Protocol.json +++ b/schemas/Presentation-Protocol.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Presentation-Protocol.json", + "$id": "presentation-protocol.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/schemas/Signing-Algorithm.json b/schemas/Signing-Algorithm.json index 7e95c8b..c427161 100644 --- a/schemas/Signing-Algorithm.json +++ b/schemas/Signing-Algorithm.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Signing-Algorithm.json", + "$id": "signing-algorim.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/schemas/Status-Algorithm.json b/schemas/Status-Algorithm.json index 6e9290a..45bb539 100644 --- a/schemas/Status-Algorithm.json +++ b/schemas/Status-Algorithm.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Status-Algorithm.json", + "$id": "status-algorithm.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/schemas/Trust-Management.json b/schemas/Trust-Management.json index 16d9f4b..4944389 100644 --- a/schemas/Trust-Management.json +++ b/schemas/Trust-Management.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Trust-Management.json", + "$id": "trust-management.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/viewer/scripts/profiles/merge.mjs b/viewer/scripts/profiles/merge.mjs index c95375b..348778a 100644 --- a/viewer/scripts/profiles/merge.mjs +++ b/viewer/scripts/profiles/merge.mjs @@ -19,8 +19,8 @@ export function mergeProfiles() { let content = readFileSync(join(schemaFolder, resource), 'utf8'); content = content.replaceAll('"$ref": "defs.json', `"$ref": "${githubPath}/main/schemas/defs.json`); const structure = JSON.parse(content); - - input[subFolder.replace(/-/g, ' ')] = { + const name = capitalizeWords(subFolder.replace(/-/g, ' ')); + input[name] = { structure, values: {} }; @@ -29,13 +29,18 @@ export function mergeProfiles() { // write the content of the file to the json object const content = JSON.parse(readFileSync(join(folder, subFolder, file), 'utf8')); content['$schema'] = content['$schema'].replace('../..', `/main/${githubPath}`); - - input[subFolder.replace(/-/g, ' ')].values[content.Name] = content; + const name = capitalizeWords(subFolder.replace(/-/g, ' ')); + input[name].values[content.Name] = content; }); }); //TODO: think about to separate the structure and the values files in the future so others can query only the information they need // write the final json object to a file writeFileSync(mergedStructure, JSON.stringify(input)); - updateSchema(); } + +function capitalizeWords(str) { + return str.split(' ') + .map(word => word.charAt(0).toUpperCase() + word.slice(1)) + .join(' '); +} diff --git a/viewer/scripts/profiles/schema.mjs b/viewer/scripts/profiles/schema.mjs index 3c10c65..fbbdf1f 100644 --- a/viewer/scripts/profiles/schema.mjs +++ b/viewer/scripts/profiles/schema.mjs @@ -10,7 +10,7 @@ export function copySchema() { } export function updateSchema() { - const schemaPath = `${schemaFolder}/Credential-Profile.json`; + const schemaPath = `${schemaFolder}/credential-profile.json`; const file = JSON.parse(readFileSync(schemaPath, 'utf8')); const generatedFolder = "src/assets/schemas"; diff --git a/viewer/src/app/credential-profiles/app.service.ts b/viewer/src/app/credential-profiles/app.service.ts index 3ec9697..6c8b8c6 100644 --- a/viewer/src/app/credential-profiles/app.service.ts +++ b/viewer/src/app/credential-profiles/app.service.ts @@ -1,6 +1,5 @@ import { Injectable } from '@angular/core'; import { Format, FormatValues, IProfile, Resources } from './resources'; -//TODO: instead of importing the values from the json file, we coulld use a http fetch. With this approach, we don't have an error when the repository is cloned and the json file is not present yet. import values from '../../assets/structure.json'; export type Resource = | 'Credential Format' diff --git a/viewer/src/assets/schemas/Credential-Format.json b/viewer/src/assets/schemas/Credential-Format.json index a715440..e649a19 100644 --- a/viewer/src/assets/schemas/Credential-Format.json +++ b/viewer/src/assets/schemas/Credential-Format.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Credential-Format.json", + "$id": "credential-format.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/viewer/src/assets/schemas/Credential-Profile.json b/viewer/src/assets/schemas/Credential-Profile.json index 25c6e70..0b6e57b 100644 --- a/viewer/src/assets/schemas/Credential-Profile.json +++ b/viewer/src/assets/schemas/Credential-Profile.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Credential-Profile.json", + "$id": "credential-profile.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/viewer/src/assets/schemas/Issuance-Protocol.json b/viewer/src/assets/schemas/Issuance-Protocol.json index c7531a0..52f5d21 100644 --- a/viewer/src/assets/schemas/Issuance-Protocol.json +++ b/viewer/src/assets/schemas/Issuance-Protocol.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Issuance-Protocol.json", + "$id": "issuance-protocol.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/viewer/src/assets/schemas/Key-Management.json b/viewer/src/assets/schemas/Key-Management.json index 83a1b30..4186999 100644 --- a/viewer/src/assets/schemas/Key-Management.json +++ b/viewer/src/assets/schemas/Key-Management.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Key-Management.json", + "$id": "key-management.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/viewer/src/assets/schemas/Presentation-Protocol.json b/viewer/src/assets/schemas/Presentation-Protocol.json index 45f9f20..04df1c0 100644 --- a/viewer/src/assets/schemas/Presentation-Protocol.json +++ b/viewer/src/assets/schemas/Presentation-Protocol.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Presentation-Protocol.json", + "$id": "presentation-protocol.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/viewer/src/assets/schemas/Signing-Algorithm.json b/viewer/src/assets/schemas/Signing-Algorithm.json index 7e95c8b..c427161 100644 --- a/viewer/src/assets/schemas/Signing-Algorithm.json +++ b/viewer/src/assets/schemas/Signing-Algorithm.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Signing-Algorithm.json", + "$id": "signing-algorim.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/viewer/src/assets/schemas/Status-Algorithm.json b/viewer/src/assets/schemas/Status-Algorithm.json index 6e9290a..45bb539 100644 --- a/viewer/src/assets/schemas/Status-Algorithm.json +++ b/viewer/src/assets/schemas/Status-Algorithm.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Status-Algorithm.json", + "$id": "status-algorithm.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/viewer/src/assets/schemas/Trust-Management.json b/viewer/src/assets/schemas/Trust-Management.json index 16d9f4b..4944389 100644 --- a/viewer/src/assets/schemas/Trust-Management.json +++ b/viewer/src/assets/schemas/Trust-Management.json @@ -1,6 +1,6 @@ { "$schema": "http://json-schema.org/draft-07/schema#", - "$id": "Trust-Management.json", + "$id": "trust-management.json", "type": "object", "additionalProperties": false, "properties": { diff --git a/viewer/src/assets/structure.json b/viewer/src/assets/structure.json index b6dacf5..d67a386 100644 --- a/viewer/src/assets/structure.json +++ b/viewer/src/assets/structure.json @@ -1 +1 @@ -{"Credential Format":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"Credential-Format.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the credential format"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Standardization (Body, Process)":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Standardization"},"Encoding Scheme":{"type":"string","description":"Data encoding on the storage layer which applies to this credential format","$comment":"can this be set as an enum since the amount of encoding schemes is limited?"},"Rich Schemas-Semantic":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the credential format able to communicate data or annotations that supports the semantic understanding of the credential data?","$comment":"this sounds like an objective field since semantic is a defined word"}]},"Crypto Agility":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the credential format capable to cover different cryptographic algorithms without any requirements and achieve cryptographic agility, as demanded by regulations?"}]},"Selective Disclosure":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the credential format capable of selective disclosure - presenting or revealing a subset of claims/attributes - without relying on architecture and protocol solutions like Just-in-Time issuance or a presentation transformation by a trusted third party?","$comment":"Do we need to ask if kind of selective disclosure reveals more information like it should? Like using SD-JWT, the verifier can see that the value came from the same credential like in the past, but this is not the case for Anoncreds"}]},"Predicates":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the credential Format able to produce general-purpose predicates, that means attestations without revealing the data, e.g. a proof to be over 18 without revealing the date of birth?"}]},"Compatibility with Signing Algorithms":{"type":"string","description":"What signing algorithms can the format be combined with?","$comment":"TBD: https://github.com/openwallet-foundation/credential-format-comparison-sig/issues/44"},"Compatibility with Key Management Methods (Issuer)":{"type":"array","items":{"type":"string"},"description":"What key management methods can the credential format be combined with?","$comment":"TBD: https://github.com/openwallet-foundation/credential-format-comparison-sig/issues/43"}},"required":["$schema","Name"],"title":"CredentialFormat"},"values":{"ACDC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"ACDC","Specification":"https://trustoverip.github.io/tswg-acdc-specification/","Standardization (Body, Process)":"","Encoding Scheme":"CESR","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":true,"Predicates":false},"AnonCred":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"AnonCred","Implementation Support":"https://github.com/hyperledger/anoncreds-rs","Specification":"https://hyperledger.github.io/anoncreds-spec/","Standardization (Body, Process)":"Community Spec (draft)","Encoding Scheme":"JSON","Rich Schemas-Semantic":false,"Crypto Agility":false,"Selective Disclosure":true,"Predicates":true,"Compatibility with Signing Algorithms":"CL","Compatibility with Key Management Methods (Issuer)":["did:indy","did:cheqd"]},"CESR/CESR Proof":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"CESR/CESR Proof","Specification":"https://www.ietf.org/archive/id/draft-pfeairheller-cesr-proof-00.html","Standardization (Body, Process)":"IETF (intention to go to Blockchain WG)","Crypto Agility":true,"Selective Disclosure":true},"CWT":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"CWT","Specification":"https://www.rfc-editor.org/rfc/rfc8392.html","Standardization (Body, Process)":"IETF","Encoding Scheme":"CBOR","Crypto Agility":true,"Selective Disclosure":false,"Predicates":false},"Gordian Envelope":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"Gordian Envelope","Implementation Support":"command-line MVP https://github.com/BlockchainCommons/envelope-cli-swift","IPR Policy":"SPDI:BSD-2-Clause-Patent https://spdx.org/licenses/BSD-2-Clause-Patent.html","Specification":"https://github.com/BlockchainCommons/BCSwiftSecureComponents","Standardization (Body, Process)":"IETF (for CBOR registration) W3C (for did method and alternative DID document and credentials data format)","Encoding Scheme":"CBOR","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"hash-inclusion proof, optional salts"},"Predicates":false},"ICAO DTC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"ICAO DTC","Standardization (Body, Process)":"ICAO","Selective Disclosure":true},"Idemix attribute-based credential":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"Idemix attribute-based credential","Implementation Support":"https://github.com/privacybydesign/gabi (cryptography), https://github.com/privacybydesign/irmago (semantics, wallet, servers, more)","Specification":"None. Protocol documented here: https://irma.app/docs/irma-protocol","Standardization (Body, Process)":"Privacy by Design Foundation","Encoding Scheme":"JSON","Rich Schemas-Semantic":true,"Crypto Agility":{"Value":false,"Description":"only Idemix support"},"Selective Disclosure":true,"Predicates":true,"Compatibility with Signing Algorithms":"CL","Compatibility with Key Management Methods (Issuer)":["raw public keys (none jwk)"]},"JWP":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"JWP","Specification":"https://github.com/json-web-proofs/json-web-proofs","Standardization (Body, Process)":"DIF","Encoding Scheme":"JSON ?","Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"ZKP, Hash&Salt"},"Predicates":true},"JWT-VC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"JWT-VC","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":false,"Predicates":false},"JWT":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"JWT","Implementation Support":"https://jwt.io/libraries","IPR Policy":"https://trustee.ietf.org/documents/trust-legal-provisions/","Specification":"https://datatracker.ietf.org/doc/rfc7519/","Standardization (Body, Process)":"IETF","Encoding Scheme":"compact and JSON serialization","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":false,"Predicates":false,"Compatibility with Signing Algorithms":"ECDSA, EdDSA, RSA","Compatibility with Key Management Methods (Issuer)":["did:key","did:web","did:ebsi","did:iota","did:jwk","did:cheqd","did:velocity"]},"LDP-VC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"LDP-VC","Implementation Support":"https://github.com/digitalbazaar/jsonld.js","IPR Policy":"https://www.w3.org/Consortium/Patent-Policy-20200915/#sec-Requirements","Specification":"https://www.w3.org/TR/vc-data-model/","Standardization (Body, Process)":"W3C","Encoding Scheme":"JSON-LD","Rich Schemas-Semantic":true,"Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"BBS\nCL-Signatures (CL)\nShort Randomizable Signatures (ps-sig)"},"Predicates":{"Value":true,"Description":"depending on signature algorithm"},"Compatibility with Signing Algorithms":"ECDSA, EdDSA, RSA","Compatibility with Key Management Methods (Issuer)":["did:key","did:web","did:ebsi","did:iota","did:jwk","did:cheqd","did:velocity"]},"MDOC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"MDOC","Specification":"ISO 18013-5","Standardization (Body, Process)":"ISO","Encoding Scheme":"CBOR","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"salted hashes"},"Predicates":false,"Compatibility with Signing Algorithms":"ECDSA(NIST and Brainpool curves), EdDSA, RSA"},"SD-JWT-VC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"SD-JWT-VC","IPR Policy":"https://trustee.ietf.org/documents/trust-legal-provisions/","Specification":"https://datatracker.ietf.org/doc/html/draft-terbu-oauth-sd-jwt-vc","Standardization (Body, Process)":"IETF (OAuth WG)","Encoding Scheme":"JSON","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":true,"Predicates":false,"Compatibility with Signing Algorithms":"ECDSA, EdDSA, RSA","Compatibility with Key Management Methods (Issuer)":["did:key","did:web","did:ebsi","did:iota","did:jwk","did:cheqd","did:velocity"]},"SD-JWT":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"SD-JWT","Implementation Support":"https://github.com/oauthstuff/draft-selective-disclosure-jwt#implementations","IPR Policy":"https://trustee.ietf.org/documents/trust-legal-provisions/","Specification":"https://datatracker.ietf.org/doc/draft-ietf-oauth-selective-disclosure-jwt/","Standardization (Body, Process)":"IETF (OAuth WG)","Encoding Scheme":"JSON, JSON-LD","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"salted hashes"},"Predicates":false},"VC (1.1)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"VC (1.1)","Implementation Support":"https://jwt.io/libraries","IPR Policy":"https://www.w3.org/Consortium/Patent-Policy-20200915/#sec-Requirements","Specification":"https://www.w3.org/TR/vc-data-model/","Standardization (Body, Process)":"W3C","Encoding Scheme":"JSON, JSON-LD","Rich Schemas-Semantic":true,"Crypto Agility":true,"Selective Disclosure":true,"Predicates":false,"Compatibility with Signing Algorithms":"ECDSA, EdDSA, RSA","Compatibility with Key Management Methods (Issuer)":["x509","did methods"]},"x509":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Format.json","Name":"x509","Standardization (Body, Process)":"ITUT","Encoding Scheme":"ASN.1","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":false,"Predicates":false}}},"Credential Profile":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"Credential-Profile.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"The name of the credential profile, as it is commonly called. This is the name that should be used to refer to the credential profile in other documents and discussions"},"Credential Profile Description":{"type":"string","description":"A brief description of the credential profile"},"Credential Format":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Credential-Format"},{"description":"The format of the credential."}]},"Signing Algorithm":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Signing-Algorithm"},{"description":"The format of the signing algorithm."}]},"Status Algorithm":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Status-Algorithm"},{"description":"The format of the status algorithm."}]},"Key Management (Issuer)":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Key-Management"},{"description":"The format of the key management for the issuer."}]},"Key Management (Holder)":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Key-Management"},{"description":"The format of the key management for the holder."}]},"Issuance Protocol":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Issuance-Protocol"},{"description":"The format of issuance protocol."}]},"Presentation Protocol":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Presentation-Protocol"},{"description":"The format of the presentation protocol."}]},"Trust Management":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Trust-Management"},{"description":"The format of the trust management."}]},"Formal Specification":{"type":"string","description":"A link to a formal specification of the credential profile."}},"required":["$schema","Credential Format","Credential Profile Description","Name","Key Management (Holder)","Key Management (Issuer)","Signing Algorithm"],"title":"CredentialProfile"},"values":{"AnonCreds with cardano blockchain":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"AnonCreds with cardano blockchain","Credential Profile Description":"AnonCreds with cardano blockchain","Credential Format":"AnonCred","Signing Algorithm":"CL","Key Management (Issuer)":"did:web","Key Management (Holder)":"link secrets","Trust Management":"Verifier knows Issuers","Formal Specification":"https://github.com/roots-id/cardano-anoncreds/blob/main/cardano-anoncred-methods.md"},"AnonCreds with did:cheqd":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"AnonCreds with did:cheqd","Credential Profile Description":"AnonCreds with did:cheqd","Credential Format":"AnonCred","Signing Algorithm":"CL","Status Algorithm":"Indy Revocation","Key Management (Issuer)":"did:cheqd","Key Management (Holder)":"link secrets","Formal Specification":"https://docs.cheqd.io/identity/advanced/anoncreds"},"AnonCreds with did:indy":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"AnonCreds with did:indy","Credential Profile Description":"Well-known default profile in all Hyperledger Indy implementations. A favoured profile due to selective disclosure and predicate capability as well as privacy-preserving revocation mechanism. Standardization in community spec in progress (July 2022).","Credential Format":"AnonCred","Signing Algorithm":"CL","Status Algorithm":"Indy Revocation","Key Management (Issuer)":"did:indy","Key Management (Holder)":"link secrets","Trust Management":"Verifier knows Issuers","Formal Specification":"https://hyperledger.github.io/anoncreds-spec/"},"AnonCreds with did:web":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"AnonCreds with did:web","Credential Profile Description":"AnonCreds with did:web","Credential Format":"AnonCred","Signing Algorithm":"CL","Status Algorithm":"Indy Revocation","Key Management (Issuer)":"did:web","Key Management (Holder)":"link secrets","Trust Management":"Verifier knows Issuers","Formal Specification":"https://github.com/2060-io/did-web-anoncreds-method"},"Decentralized Identity Interop Profile":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"Decentralized Identity Interop Profile","Formal Specification":"https://dutchblockchaincoalition.github.io/DIIP/","Credential Profile Description":"Decentralized Identity Interop Profile","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:jwk","Issuance Protocol":"OpenID4VCI","Presentation Protocol":"OpenID4VP"},"EBSI":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"EBSI","Credential Profile Description":"[Profile description goes here]","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:ebsi","Key Management (Holder)":"did:key","Trust Management":"EBSI Trust Registries"},"HAIP":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"HAIP","Credential Profile Description":"OpenID4VC High Assurance Interoperability Profile with SD-JWT-VC","Formal Specification":"https://vcstuff.github.io/oid4vc-haip-sd-jwt-vc/draft-oid4vc-haip-sd-jwt-vc.html#name-authors-addresses","Credential Format":"SD-JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"JWT/CWT status list","Key Management (Issuer)":".well-known/jwt-issuer","Key Management (Holder)":"raw public keys (jwk)","Issuance Protocol":"OpenID4VCI","Presentation Protocol":"OpenID4VP"},"ICAO DTC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"ICAO DTC","Credential Profile Description":"[Profile description goes here]","Credential Format":"ICAO DTC","Signing Algorithm":"ECDSA","Status Algorithm":"SLTD database (travel and identity documents)","Key Management (Issuer)":"raw public keys (none jwk)","Key Management (Holder)":"raw public keys (none jwk)","Trust Management":"X.509 certificates"},"IRMA (Yivi) wallet":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"IRMA (Yivi) wallet","Credential Profile Description":"https://dominoweb.draco.res.ibm.com/reports/rz3730_revised.pdf","Credential Format":"Idemix attribute-based credential","Signing Algorithm":"CL","Status Algorithm":"RSA-B - cryptographic accumulator based on RSA","Key Management (Issuer)":"raw public keys (none jwk)","Key Management (Holder)":"link secrets","Trust Management":"IRMA (Yivi) Schemes"},"ISO mDL":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"ISO mDL","Credential Profile Description":"[Profile description goes here]","Credential Format":"MDOC","Signing Algorithm":"ECDSA","Status Algorithm":"medium-term expiration","Key Management (Issuer)":"pub key in X.509 cert","Key Management (Holder)":"cose key","Trust Management":"Verified issuer certificate authority list (VICAL)","Formal Specification":"ISO 18013-5"},"JFFLabs x VC-EDU PlugFest2 (LDP)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"JFFLabs x VC-EDU PlugFest2 (LDP)","Credential Profile Description":"Interoperability profile used in the PlugFest2","Credential Format":"JWT-VC","Signing Algorithm":"EdDSA","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:jwk"},"JFFLabs x VC-EDU PlugFest2 (VC)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"JFFLabs x VC-EDU PlugFest2 (VC)","Credential Profile Description":"Interoperability profile used in the PlugFest2","Credential Format":"LDP-VC","Signing Algorithm":"EdDSA","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:key"},"JSON-LD VCs with BBS (Credential is Secret)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"JSON-LD VCs with BBS (Credential is Secret)","Credential Profile Description":"[Profile description goes here]","Credential Format":"LDP-VC","Signing Algorithm":"BoundBBS+","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:web","Key Management (Holder)":"credential as secret"},"JSON-LD VCs with BBS (Holder DID)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"JSON-LD VCs with BBS (Holder DID)","Credential Profile Description":"[Profile description goes here]","Credential Format":"LDP-VC","Signing Algorithm":"BBS+ with public key binding","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:key"},"JWT VC Presentation Profile 2":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"JWT VC Presentation Profile 2","Credential Profile Description":"https://identity.foundation/jwt-vc-presentation-profile/","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:ion (long form)"},"JWT VC Presentation Profile":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"JWT VC Presentation Profile","Credential Profile Description":"https://identity.foundation/jwt-vc-presentation-profile/","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:ion (long form)","Key Management (Holder)":"did:ion (long form)"},"NGI Atlantic for OpenID4VCs":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"NGI Atlantic for OpenID4VCs","Credential Profile Description":"https://ngiatlantic.info\nhttps://ngiatlantic.eu/funded-experiments/next-generation-ssi-standards","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"short-term expiration","Key Management (Issuer)":"did:key","Key Management (Holder)":"did:key","Trust Management":"TRAIN","Formal Specification":"https://ngiatlantic.info"},"SD-JWT VCs (w/ X.509 for Issuers)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"SD-JWT VCs (w/ X.509 for Issuers)","Credential Profile Description":"[Profile description goes here]","Credential Format":"SD-JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"JWT/CWT status list","Key Management (Issuer)":"raw public keys (none jwk)","Key Management (Holder)":"did:jwk","Trust Management":"X.509 certificates"},"x.509":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Credential-Profile.json","Name":"x.509","Credential Profile Description":"[Profile description goes here]","Credential Format":"x509","Signing Algorithm":"ECDSA","Status Algorithm":"CRL - certificate revocation list","Key Management (Issuer)":"raw public keys (none jwk)","Key Management (Holder)":"raw public keys (none jwk)","Trust Management":"X.509 certificates"}}},"Issuance Protocol":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"Issuance-Protocol.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the issuance protocol"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"}},"required":["$schema","Name"],"title":"IssuanceProtocol"},"values":{"ACDC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Issuance-Protocol.json","Name":"ACDC"},"ISO 23220-3":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Issuance-Protocol.json","Name":"ISO 23220-3"},"Issue Credential v1":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Issuance-Protocol.json","Name":"Issue Credential v1","Specification":"https://github.com/hyperledger/aries-rfcs/blob/main/features/0036-issue-credential/README.md"},"Issue Credential v2":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Issuance-Protocol.json","Name":"Issue Credential v2"},"OpenID4VCI":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Issuance-Protocol.json","Name":"OpenID4VCI","Specification":"https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html"}}},"Key Management":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"Key-Management.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the method"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Infrastructure for Key Resolution":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is there any infrastructure required to resolve keys and/or validate identifier to key binding?"}]},"Key Rotation":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Can the key referred to in a credential be replaced by another key?"}]},"Key History":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is it possible to retain and obtain the history of keys related to a certain identifier? In case of key rotation it is important for signed credentials to request older keys that are not used for signing anymore"}]},"Party":{"type":"array","items":{"enum":["issuer","holder"]},"description":"What party may uses this technique?","$comment":"We are not looking at verifiers here, since e.g. the identification of the verifier is not part of the credential comparison matrix"}},"required":["$schema","Name"],"title":"KeyManagement"},"values":{".well-known/jwt-issuer":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":".well-known/jwt-issuer"},"cose key":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"cose key","Implementation Support":"https://www.rfc-editor.org/rfc/rfc9052.html"},"credential as secret":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"credential as secret","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder"]},"did:cheqd":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:cheqd","Specification":"https://docs.cheqd.io/identity/architecture/adr-list/adr-001-cheqd-did-method","Implementation Support":"https://docs.cheqd.io/identity/sdk/understanding-sdks","Party":["issuer"]},"did:ebsi":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:ebsi","Implementation Support":"https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/EBSI+DID+Method","Infrastructure for Key Resolution":{"Value":true,"Description":"dlt"},"Key Rotation":true,"Key History":true,"Party":["issuer"]},"did:indy":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:indy","Implementation Support":"https://hyperledger.github.io/indy-did-method/","Infrastructure for Key Resolution":{"Value":true,"Description":"dlt"},"Key Rotation":true,"Key History":true,"Party":["issuer"]},"did:ion (long form)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:ion (long form)","Implementation Support":"https://github.com/decentralized-identity/ion","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder","issuer"]},"did:ion (short form)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:ion (short form)","Infrastructure for Key Resolution":true,"Key Rotation":true,"Key History":true,"Party":["issuer"]},"did:jwk":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:jwk","Party":["holder","issuer"]},"did:keri":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:keri","Implementation Support":"https://weboftrust.github.io/did-keri/","Infrastructure for Key Resolution":{"Value":true,"Description":"witness network"},"Key Rotation":true,"Key History":true,"Party":["holder","issuer"]},"did:key":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:key","Implementation Support":"https://w3c-ccg.github.io/did-method-key/","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder","issuer"]},"did:peer":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:peer","Implementation Support":"https://identity.foundation/peer-did-method-spec/index.html","Party":["holder"]},"did:web":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"did:web","Implementation Support":"https://github.com/w3c-ccg/did-method-web","Infrastructure for Key Resolution":{"Value":true,"Description":"web server"},"Key Rotation":true,"Key History":false,"Party":["holder","issuer"]},"jwks_uri":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"jwks_uri","Infrastructure for Key Resolution":{"Value":true,"Description":"web server"},"Key Rotation":true,"Key History":{"Value":true,"Description":"conditional (with OpenID Connect Federation Key History)"},"Party":["issuer"]},"link secrets":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"link secrets","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder"]},"pub key in X.509 cert":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"pub key in X.509 cert"},"raw public keys (jwk)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"raw public keys (jwk)","Implementation Support":"https://www.rfc-editor.org/rfc/rfc7517","IPR Policy":"https://trustee.ietf.org/documents/trust-legal-provisions/","Specification":"https://www.rfc-editor.org/rfc/rfc7517","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":{"Value":true,"Description":"conditional (with OpenID Connect Federation Key History)"},"Party":["holder","issuer"]},"raw public keys (none jwk)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Key-Management.json","Name":"raw public keys (none jwk)","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder","issuer"]}}},"Presentation Protocol":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"Presentation-Protocol.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the presentation protocol"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"}},"required":["$schema","Name"],"title":"PresentationProtocol"},"values":{"OpenID4VP":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Presentation-Protocol.json","Name":"OpenID4VP","Specification":"https://openid.net/specs/openid-4-verifiable-presentations-1_0.html"},"Present Proof v2":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Presentation-Protocol.json","Name":"Present Proof v2","Specification":"https://hyperledger.github.io/aries-rfcs/latest/aip2/0454-present-proof-v2"},"Present Proof v1.0":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Presentation-Protocol.json","Name":"Present Proof v1.0","Specification":"https://github.com/hyperledger/aries-rfcs/blob/main/features/0037-present-proof/README.md"}}},"Signing Algorithm":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"Signing-Algorithm.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"A unique identifier for the signing algorithm"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Standardization (Body, Process)":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Standardization"},"Recognition by government authorities (NIST, BSI, ...)":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the signing algorithm recognized in regulatory frameworks of leading government bodies?"}]},"Performance":{"type":"string","description":"How performant is the signing algorithm?","$comment":"difficult to answer, since there is no performance framework to measure against"},"Hardware support":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the Signing Algorithm supported by common hardware-backed cryptographic implementations, such as Secure Elements, SecureEnclave, HSM, Strongbox, TEE, TPM","$comment":"Using different approaches can lead to different results when choosing key lengths or performance measurements"}]},"Unlinkability-Uncorrelatability-Blind signatures possible":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the Signing Algorithm capable of creating a credential scheme, such that two verification processes can not be linked/correlated by colluding Verifiers/Relying Parties?"}]},"Security strength":{"type":"string","description":"What level of security strength is common and standardized for this signing algorithm?"},"Post-quantum security":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the Signing Algorithm still secure if quantum computing achieves substantial computation power?"}]}},"required":["$schema","Name"],"title":"SigningAlgorithm"},"values":{"BBS+ with public key binding":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Signing-Algorithm.json","Name":"BBS+ with public key binding","Implementation Support":"https://github.com/mattrglobal/bbs-signatures","Specification":"https://datatracker.ietf.org/doc/draft-looker-cfrg-bbs-signatures/","Standardization (Body, Process)":"DIF (intention to transfer to IRTF CFRG)","Recognition by government authorities (NIST, BSI, ...)":{"Value":false,"Description":"not acknowledged"},"Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Security strength":"381 bit curve","Post-quantum security":false},"BoundBBS+":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Signing-Algorithm.json","Name":"BoundBBS+","IPR Policy":"barely","Standardization (Body, Process)":"DIF (intention to transfer to IRTF CFRG)","Recognition by government authorities (NIST, BSI, ...)":{"Value":false,"Description":"not acknowledged"},"Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":true,"Post-quantum security":false},"CL":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Signing-Algorithm.json","Name":"CL","Implementation Support":"Hyperledger Ursa, https://github.com/privacybydesign/gabi ","Specification":"CL-Signatures of there own do not have a formal specification, that is included in Anoncreds","Standardization (Body, Process)":"none","Recognition by government authorities (NIST, BSI, ...)":{"Value":false,"Description":"not acknowledged (independent crypto analysis published)"},"Performance":"Ursa: up to 7 seconds for a validation and approximately 30 seconds for credential definition generation; IRMA (Yivi): both in less than a second","Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":true,"Security strength":"equivalent to RSA2048","Post-quantum security":false},"ECDSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Signing-Algorithm.json","Name":"ECDSA","Implementation Support":"many mature implementations","Specification":"X9.62-2005","Standardization (Body, Process)":"ANSI","Recognition by government authorities (NIST, BSI, ...)":true,"Hardware support":true,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Security strength":"256 / 384 / 512 bit","Post-quantum security":false},"EdDSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Signing-Algorithm.json","Name":"EdDSA","Implementation Support":"many mature implementations","Recognition by government authorities (NIST, BSI, ...)":{"Value":true,"Description":"widely accepted, though still behind ECDSA"},"Performance":"high","Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Security strength":"257 / 384 / 512 bit","Post-quantum security":false},"PS":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Signing-Algorithm.json","Name":"PS","Implementation Support":"Hyperledger Anoncreds, https://github.com/hyperledger/anoncreds-v2-rs ","Specification":"PS-Signatures of there own do not have a formal specification, that is included in Anoncreds-V2","Standardization (Body, Process)":"none","Recognition by government authorities (NIST, BSI, ...)":{"Value":false,"Description":"not acknowledged (independent crypto analysis published)"},"Hardware support":false,"Performance":"medium, faster than CL, slower than Schnorr, single-digit milliseconds for all operations, even in a threshold decentralized setting","Unlinkability-Uncorrelatability-Blind signatures possible":true,"Post-quantum security":false},"RSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Signing-Algorithm.json","Name":"RSA","Implementation Support":"many mature implementations","Recognition by government authorities (NIST, BSI, ...)":{"Value":true,"Description":"but support is fading"},"Hardware support":true,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Security strength":"2048 / 3072 / 4096 (scales bad)","Post-quantum security":false},"Schnorr":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Signing-Algorithm.json","Name":"Schnorr","Implementation Support":"many mature implementations","IPR Policy":"patents expired","Specification":"different curves-different specs","Standardization (Body, Process)":"different curves-different standards","Recognition by government authorities (NIST, BSI, ...)":{"Value":true,"Description":"NIST with Curve25519"},"Performance":"high","Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Post-quantum security":false}}},"Status Algorithm":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"Status-Algorithm.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the algorithm"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Standardization (Body, Process)":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Standardization"},"Recognition by government authorities (NIST, BSI, ...)":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the status algorithm recognized in regulatory frameworks of leading government bodies?"}]},"Category":{"type":"string","description":"Algorithm that behind the implementation of the revocation (Bitlist = each credential has a position in the list. Deny-List: revoked credentials will be added on demand. Accumulator: cryptographic proof the holder presents to show that the credential is not revoked)"},"Performance":{"type":"string","description":"How performant is the revocation mechanism (for issuer, holder and verifier)?","$comment":"For this case there could be some king of test framework"},"Observability":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Does the Verifier have the possibility to observe the revocation status beyond the presentation?"}]},"Traceability":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Does the issuer have possibilities to trace the usage of his issued credentials through the revocation mechanism?","$comment":"With a size of one used element the issuer should always be able to trace the usage of his issued credentials"}]},"Scalability":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"At what scale has the algorithm/technology been demonstrated to work? Are there any known issues?"}]},"Offline Friendliness":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Does the revocation mechanism support an authentication if the holder is offline?"}]}},"required":["$schema","Name"],"title":"RevocationAlgorithm"},"values":{"BBF18-cryptographic accumulator based on RSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"BBF18-cryptographic accumulator based on RSA","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Accumulator","Observability":false},"CRL - certificate revocation list":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"CRL - certificate revocation list","Recognition by government authorities (NIST, BSI, ...)":true,"Category":"Deny-List","Observability":true},"Indy Revocation":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"Indy Revocation","Implementation Support":"Indy SDK","Standardization (Body, Process)":"AnonCreds","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Accumulator","Observability":false,"Scalability":{"Value":false,"Description":"limitations by accumulator size"}},"JWT/CWT status list":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"JWT/CWT status list","Implementation Support":"https://github.com/vcstuff/draft-looker-oauth-jwt-cwt-status-list","Specification":"https://datatracker.ietf.org/doc/draft-terbu-oauth-sd-jwt-vc/","Standardization (Body, Process)":"IETF Individual","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Bitstring","Observability":true,"Traceability":{"Value":true,"Description":"potentially possible with malicious issuer by providing a revocation list with a single entry"}},"Non-Revocation Token":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"Non-Revocation Token"},"RSA-B - cryptographic accumulator based on RSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"RSA-B - cryptographic accumulator based on RSA","Implementation Support":"https://github.com/privacybydesign/gabi/tree/master/revocation","Specification":"https://eprint.iacr.org/2017/043.pdf","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Accumulator","Observability":true,"Traceability":false,"Offline Friendliness":true},"SLTD database (travel and identity documents)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"SLTD database (travel and identity documents)","Category":"Deny-List"},"Status List 2021":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"Status List 2021","Implementation Support":"https://github.com/transmute-industries/verifiable-data/tree/main/packages/vc-status-rl-2020","Specification":"https://w3c-ccg.github.io/vc-status-list-2021/","Standardization (Body, Process)":"W3C","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Bitstring","Observability":true,"Traceability":{"Value":true,"Description":"potentially possible with malicious issuer by providing a revocation list with a single entry"}},"VB20 - cryptographic accumulator based on pairings":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"VB20 - cryptographic accumulator based on pairings","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Accumulator","Observability":false},"Validity Credential":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"Validity Credential"},"medium-term expiration":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"medium-term expiration","Specification":"weeks"},"short-term expiration":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Status-Algorithm.json","Name":"short-term expiration","Specification":"minutes"}}},"Trust Management":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"Trust-Management.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"A unique identifier for the trust management approach"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Standardization (Body, Process)":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Standardization"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Description":{"type":"string","description":"Explanation or link to a source how this trust management approach works"}},"required":["$schema","Name"],"title":"TrustManagement"},"values":{"EBSI Trust Registries":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Trust-Management.json","Name":"EBSI Trust Registries","Description":"Ledger-anchored trust registries"},"IRMA (Yivi) Schemes":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Trust-Management.json","Name":"IRMA (Yivi) Schemes","Specification":"https://irma.app/docs/schemes/","Description":"every issuer publishes its keys at a certain URL, the whole structure is signed by a trusted authority"},"OpenID Connect Federation":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Trust-Management.json","Name":"OpenID Connect Federation","Standardization (Body, Process)":"OpenID Foundation","Specification":"https://openid.net/specs/openid-connect-federation-1_0.html","Description":"Uses JWTs and REST APIs to represent trust chains and trust marks"},"TRAIN":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Trust-Management.json","Name":"TRAIN","Implementation Support":"https://gitlab.cc-asp.fraunhofer.de/train","IPR Policy":"Apache 2.0","Standardization (Body, Process)":"none","Specification":"none","Description":"Uses DNS records and ETSI Trusted Lists for trust management, developed in the EU Project NGI ESSIF-Lab, https://train.trust-scheme.de/info/"},"Trusted Lists":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Trust-Management.json","Name":"Trusted Lists","Standardization (Body, Process)":"ETSi","Specification":"https://www.etsi.org/deliver/etsi_ts/119600_119699/119612/02.02.01_60/ts_119612v020201p.pdf","Description":"used by EU Trusted List (https://webgate.ec.europa.eu/tl-browser/)"},"Verified issuer certificate authority list (VICAL)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Trust-Management.json","Name":"Verified issuer certificate authority list (VICAL)","Specification":"ISO 18013-5, Annex C"},"Verifier knows Issuers":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Trust-Management.json","Name":"Verifier knows Issuers","Implementation Support":"Manual / bespoke","IPR Policy":"None","Standardization (Body, Process)":"None","Specification":"None","Description":"The verifier knows which issuers he trusts for issuing certain credentials, organizational solution"},"X.509 certificates":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/Trust-Management.json","Name":"X.509 certificates","Implementation Support":"broadly available","Description":"Trust is managed by way of attributes attested in the certificate (e.g. could be role of an issuer) in combination with trust chains. The ultimate entity in the chain is typically trust anchor recipients need to rely in. "}}},"defs":{"$schema":"http://json-schema.org/draft-07/schema","$id":"defs.json","type":"object","definitions":{"Schema":{"type":"string","description":"JSON Schema URI"},"Filter":{"type":["object","boolean"],"properties":{"Value":{"type":"boolean","description":"Allows to filter this property"},"Description":{"type":"string","description":"Give more information about this property"}},"additionalProperties":false,"required":["Value"]},"Implementation-Support":{"type":"string","description":"Links to SDKs or documentation how to implement it.","$comment":"Objective field, only link to resources. Do not explain like 'easy to implement' since this is subjective."},"IPR-Policy":{"type":"string","description":"What is the policy regarding intellectual properties associated with this technology?"},"Specification":{"type":"string","description":"Where is it specified?"},"Standardization":{"type":"string","description":"Under which Standardization Body and which standards track/status is it standardized?"},"LinkElement":{"type":"object","additionalProperties":false,"properties":{"name":{"type":"string"},"link":{"type":"string","format":"uri","qt-uri-protocols":["https"]}},"required":["link","name"],"title":"LinkElement"}}}} \ No newline at end of file +{"Credential Format":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"credential-format.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the credential format"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Standardization (Body, Process)":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Standardization"},"Encoding Scheme":{"type":"string","description":"Data encoding on the storage layer which applies to this credential format","$comment":"can this be set as an enum since the amount of encoding schemes is limited?"},"Rich Schemas-Semantic":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the credential format able to communicate data or annotations that supports the semantic understanding of the credential data?","$comment":"this sounds like an objective field since semantic is a defined word"}]},"Crypto Agility":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the credential format capable to cover different cryptographic algorithms without any requirements and achieve cryptographic agility, as demanded by regulations?"}]},"Selective Disclosure":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the credential format capable of selective disclosure - presenting or revealing a subset of claims/attributes - without relying on architecture and protocol solutions like Just-in-Time issuance or a presentation transformation by a trusted third party?","$comment":"Do we need to ask if kind of selective disclosure reveals more information like it should? Like using SD-JWT, the verifier can see that the value came from the same credential like in the past, but this is not the case for Anoncreds"}]},"Predicates":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the credential Format able to produce general-purpose predicates, that means attestations without revealing the data, e.g. a proof to be over 18 without revealing the date of birth?"}]},"Compatibility with Signing Algorithms":{"type":"string","description":"What signing algorithms can the format be combined with?","$comment":"TBD: https://github.com/openwallet-foundation/credential-format-comparison-sig/issues/44"},"Compatibility with Key Management Methods (Issuer)":{"type":"array","items":{"type":"string"},"description":"What key management methods can the credential format be combined with?","$comment":"TBD: https://github.com/openwallet-foundation/credential-format-comparison-sig/issues/43"}},"required":["$schema","Name"],"title":"CredentialFormat"},"values":{"ACDC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"ACDC","Specification":"https://trustoverip.github.io/tswg-acdc-specification/","Standardization (Body, Process)":"","Encoding Scheme":"CESR","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":true,"Predicates":false},"AnonCred":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"AnonCred","Implementation Support":"https://github.com/hyperledger/anoncreds-rs","Specification":"https://hyperledger.github.io/anoncreds-spec/","Standardization (Body, Process)":"Community Spec (draft)","Encoding Scheme":"JSON","Rich Schemas-Semantic":false,"Crypto Agility":false,"Selective Disclosure":true,"Predicates":true,"Compatibility with Signing Algorithms":"CL","Compatibility with Key Management Methods (Issuer)":["did:indy","did:cheqd"]},"CESR/CESR Proof":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"CESR/CESR Proof","Specification":"https://www.ietf.org/archive/id/draft-pfeairheller-cesr-proof-00.html","Standardization (Body, Process)":"IETF (intention to go to Blockchain WG)","Crypto Agility":true,"Selective Disclosure":true},"CWT":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"CWT","Specification":"https://www.rfc-editor.org/rfc/rfc8392.html","Standardization (Body, Process)":"IETF","Encoding Scheme":"CBOR","Crypto Agility":true,"Selective Disclosure":false,"Predicates":false},"Gordian Envelope":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"Gordian Envelope","Implementation Support":"command-line MVP https://github.com/BlockchainCommons/envelope-cli-swift","IPR Policy":"SPDI:BSD-2-Clause-Patent https://spdx.org/licenses/BSD-2-Clause-Patent.html","Specification":"https://github.com/BlockchainCommons/BCSwiftSecureComponents","Standardization (Body, Process)":"IETF (for CBOR registration) W3C (for did method and alternative DID document and credentials data format)","Encoding Scheme":"CBOR","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"hash-inclusion proof, optional salts"},"Predicates":false},"ICAO DTC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"ICAO DTC","Standardization (Body, Process)":"ICAO","Selective Disclosure":true},"Idemix attribute-based credential":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"Idemix attribute-based credential","Implementation Support":"https://github.com/privacybydesign/gabi (cryptography), https://github.com/privacybydesign/irmago (semantics, wallet, servers, more)","Specification":"None. Protocol documented here: https://irma.app/docs/irma-protocol","Standardization (Body, Process)":"Privacy by Design Foundation","Encoding Scheme":"JSON","Rich Schemas-Semantic":true,"Crypto Agility":{"Value":false,"Description":"only Idemix support"},"Selective Disclosure":true,"Predicates":true,"Compatibility with Signing Algorithms":"CL","Compatibility with Key Management Methods (Issuer)":["raw public keys (none jwk)"]},"JWP":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"JWP","Specification":"https://github.com/json-web-proofs/json-web-proofs","Standardization (Body, Process)":"DIF","Encoding Scheme":"JSON ?","Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"ZKP, Hash&Salt"},"Predicates":true},"JWT-VC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"JWT-VC","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":false,"Predicates":false},"JWT":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"JWT","Implementation Support":"https://jwt.io/libraries","IPR Policy":"https://trustee.ietf.org/documents/trust-legal-provisions/","Specification":"https://datatracker.ietf.org/doc/rfc7519/","Standardization (Body, Process)":"IETF","Encoding Scheme":"compact and JSON serialization","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":false,"Predicates":false,"Compatibility with Signing Algorithms":"ECDSA, EdDSA, RSA","Compatibility with Key Management Methods (Issuer)":["did:key","did:web","did:ebsi","did:iota","did:jwk","did:cheqd","did:velocity"]},"LDP-VC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"LDP-VC","Implementation Support":"https://github.com/digitalbazaar/jsonld.js","IPR Policy":"https://www.w3.org/Consortium/Patent-Policy-20200915/#sec-Requirements","Specification":"https://www.w3.org/TR/vc-data-model/","Standardization (Body, Process)":"W3C","Encoding Scheme":"JSON-LD","Rich Schemas-Semantic":true,"Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"BBS\nCL-Signatures (CL)\nShort Randomizable Signatures (ps-sig)"},"Predicates":{"Value":true,"Description":"depending on signature algorithm"},"Compatibility with Signing Algorithms":"ECDSA, EdDSA, RSA","Compatibility with Key Management Methods (Issuer)":["did:key","did:web","did:ebsi","did:iota","did:jwk","did:cheqd","did:velocity"]},"MDOC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"MDOC","Specification":"ISO 18013-5","Standardization (Body, Process)":"ISO","Encoding Scheme":"CBOR","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"salted hashes"},"Predicates":false,"Compatibility with Signing Algorithms":"ECDSA(NIST and Brainpool curves), EdDSA, RSA"},"SD-JWT-VC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"SD-JWT-VC","IPR Policy":"https://trustee.ietf.org/documents/trust-legal-provisions/","Specification":"https://datatracker.ietf.org/doc/html/draft-terbu-oauth-sd-jwt-vc","Standardization (Body, Process)":"IETF (OAuth WG)","Encoding Scheme":"JSON","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":true,"Predicates":false,"Compatibility with Signing Algorithms":"ECDSA, EdDSA, RSA","Compatibility with Key Management Methods (Issuer)":["did:key","did:web","did:ebsi","did:iota","did:jwk","did:cheqd","did:velocity"]},"SD-JWT":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"SD-JWT","Implementation Support":"https://github.com/oauthstuff/draft-selective-disclosure-jwt#implementations","IPR Policy":"https://trustee.ietf.org/documents/trust-legal-provisions/","Specification":"https://datatracker.ietf.org/doc/draft-ietf-oauth-selective-disclosure-jwt/","Standardization (Body, Process)":"IETF (OAuth WG)","Encoding Scheme":"JSON, JSON-LD","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":{"Value":true,"Description":"salted hashes"},"Predicates":false},"VC (1.1)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"VC (1.1)","Implementation Support":"https://jwt.io/libraries","IPR Policy":"https://www.w3.org/Consortium/Patent-Policy-20200915/#sec-Requirements","Specification":"https://www.w3.org/TR/vc-data-model/","Standardization (Body, Process)":"W3C","Encoding Scheme":"JSON, JSON-LD","Rich Schemas-Semantic":true,"Crypto Agility":true,"Selective Disclosure":true,"Predicates":false,"Compatibility with Signing Algorithms":"ECDSA, EdDSA, RSA","Compatibility with Key Management Methods (Issuer)":["x509","did methods"]},"x509":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-format.json","Name":"x509","Standardization (Body, Process)":"ITUT","Encoding Scheme":"ASN.1","Rich Schemas-Semantic":false,"Crypto Agility":true,"Selective Disclosure":false,"Predicates":false}}},"Credential Profile":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"credential-profile.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"The name of the credential profile, as it is commonly called. This is the name that should be used to refer to the credential profile in other documents and discussions"},"Credential Profile Description":{"type":"string","description":"A brief description of the credential profile"},"Credential Format":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Credential-Format"},{"description":"The format of the credential."}]},"Signing Algorithm":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Signing-Algorithm"},{"description":"The format of the signing algorithm."}]},"Status Algorithm":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Status-Algorithm"},{"description":"The format of the status algorithm."}]},"Key Management (Issuer)":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Key-Management"},{"description":"The format of the key management for the issuer."}]},"Key Management (Holder)":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Key-Management"},{"description":"The format of the key management for the holder."}]},"Issuance Protocol":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Issuance-Protocol"},{"description":"The format of issuance protocol."}]},"Presentation Protocol":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Presentation-Protocol"},{"description":"The format of the presentation protocol."}]},"Trust Management":{"allOf":[{"$ref":"../viewer/src/assets/schemas/fields.json#/definitions/Trust-Management"},{"description":"The format of the trust management."}]},"Formal Specification":{"type":"string","description":"A link to a formal specification of the credential profile."}},"required":["$schema","Credential Format","Credential Profile Description","Name","Key Management (Holder)","Key Management (Issuer)","Signing Algorithm"],"title":"CredentialProfile"},"values":{"AnonCreds with cardano blockchain":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"AnonCreds with cardano blockchain","Credential Profile Description":"AnonCreds with cardano blockchain","Credential Format":"AnonCred","Signing Algorithm":"CL","Key Management (Issuer)":"did:web","Key Management (Holder)":"link secrets","Trust Management":"Verifier knows Issuers","Formal Specification":"https://github.com/roots-id/cardano-anoncreds/blob/main/cardano-anoncred-methods.md"},"AnonCreds with did:cheqd":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"AnonCreds with did:cheqd","Credential Profile Description":"AnonCreds with did:cheqd","Credential Format":"AnonCred","Signing Algorithm":"CL","Status Algorithm":"Indy Revocation","Key Management (Issuer)":"did:cheqd","Key Management (Holder)":"link secrets","Formal Specification":"https://docs.cheqd.io/identity/advanced/anoncreds"},"AnonCreds with did:indy":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"AnonCreds with did:indy","Credential Profile Description":"Well-known default profile in all Hyperledger Indy implementations. A favoured profile due to selective disclosure and predicate capability as well as privacy-preserving revocation mechanism. Standardization in community spec in progress (July 2022).","Credential Format":"AnonCred","Signing Algorithm":"CL","Status Algorithm":"Indy Revocation","Key Management (Issuer)":"did:indy","Key Management (Holder)":"link secrets","Trust Management":"Verifier knows Issuers","Formal Specification":"https://hyperledger.github.io/anoncreds-spec/"},"AnonCreds with did:web":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"AnonCreds with did:web","Credential Profile Description":"AnonCreds with did:web","Credential Format":"AnonCred","Signing Algorithm":"CL","Status Algorithm":"Indy Revocation","Key Management (Issuer)":"did:web","Key Management (Holder)":"link secrets","Trust Management":"Verifier knows Issuers","Formal Specification":"https://github.com/2060-io/did-web-anoncreds-method"},"Decentralized Identity Interop Profile":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"Decentralized Identity Interop Profile","Formal Specification":"https://dutchblockchaincoalition.github.io/DIIP/","Credential Profile Description":"Decentralized Identity Interop Profile","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:jwk","Issuance Protocol":"OpenID4VCI","Presentation Protocol":"OpenID4VP"},"EBSI":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"EBSI","Credential Profile Description":"[Profile description goes here]","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:ebsi","Key Management (Holder)":"did:key","Trust Management":"EBSI Trust Registries"},"HAIP":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"HAIP","Credential Profile Description":"OpenID4VC High Assurance Interoperability Profile with SD-JWT-VC","Formal Specification":"https://vcstuff.github.io/oid4vc-haip-sd-jwt-vc/draft-oid4vc-haip-sd-jwt-vc.html#name-authors-addresses","Credential Format":"SD-JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"JWT/CWT status list","Key Management (Issuer)":".well-known/jwt-issuer","Key Management (Holder)":"raw public keys (jwk)","Issuance Protocol":"OpenID4VCI","Presentation Protocol":"OpenID4VP"},"ICAO DTC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"ICAO DTC","Credential Profile Description":"[Profile description goes here]","Credential Format":"ICAO DTC","Signing Algorithm":"ECDSA","Status Algorithm":"SLTD database (travel and identity documents)","Key Management (Issuer)":"raw public keys (none jwk)","Key Management (Holder)":"raw public keys (none jwk)","Trust Management":"X.509 certificates"},"IRMA (Yivi) wallet":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"IRMA (Yivi) wallet","Credential Profile Description":"https://dominoweb.draco.res.ibm.com/reports/rz3730_revised.pdf","Credential Format":"Idemix attribute-based credential","Signing Algorithm":"CL","Status Algorithm":"RSA-B - cryptographic accumulator based on RSA","Key Management (Issuer)":"raw public keys (none jwk)","Key Management (Holder)":"link secrets","Trust Management":"IRMA (Yivi) Schemes"},"ISO mDL":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"ISO mDL","Credential Profile Description":"[Profile description goes here]","Credential Format":"MDOC","Signing Algorithm":"ECDSA","Status Algorithm":"medium-term expiration","Key Management (Issuer)":"pub key in X.509 cert","Key Management (Holder)":"cose key","Trust Management":"Verified issuer certificate authority list (VICAL)","Formal Specification":"ISO 18013-5"},"JFFLabs x VC-EDU PlugFest2 (LDP)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"JFFLabs x VC-EDU PlugFest2 (LDP)","Credential Profile Description":"Interoperability profile used in the PlugFest2","Credential Format":"JWT-VC","Signing Algorithm":"EdDSA","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:jwk"},"JFFLabs x VC-EDU PlugFest2 (VC)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"JFFLabs x VC-EDU PlugFest2 (VC)","Credential Profile Description":"Interoperability profile used in the PlugFest2","Credential Format":"LDP-VC","Signing Algorithm":"EdDSA","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:key"},"JSON-LD VCs with BBS (Credential is Secret)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"JSON-LD VCs with BBS (Credential is Secret)","Credential Profile Description":"[Profile description goes here]","Credential Format":"LDP-VC","Signing Algorithm":"BoundBBS+","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:web","Key Management (Holder)":"credential as secret"},"JSON-LD VCs with BBS (Holder DID)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"JSON-LD VCs with BBS (Holder DID)","Credential Profile Description":"[Profile description goes here]","Credential Format":"LDP-VC","Signing Algorithm":"BBS+ with public key binding","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:key"},"JWT VC Presentation Profile 2":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"JWT VC Presentation Profile 2","Credential Profile Description":"https://identity.foundation/jwt-vc-presentation-profile/","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:web","Key Management (Holder)":"did:ion (long form)"},"JWT VC Presentation Profile":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"JWT VC Presentation Profile","Credential Profile Description":"https://identity.foundation/jwt-vc-presentation-profile/","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"Status List 2021","Key Management (Issuer)":"did:ion (long form)","Key Management (Holder)":"did:ion (long form)"},"NGI Atlantic for OpenID4VCs":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"NGI Atlantic for OpenID4VCs","Credential Profile Description":"https://ngiatlantic.info\nhttps://ngiatlantic.eu/funded-experiments/next-generation-ssi-standards","Credential Format":"JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"short-term expiration","Key Management (Issuer)":"did:key","Key Management (Holder)":"did:key","Trust Management":"TRAIN","Formal Specification":"https://ngiatlantic.info"},"SD-JWT VCs (w/ X.509 for Issuers)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"SD-JWT VCs (w/ X.509 for Issuers)","Credential Profile Description":"[Profile description goes here]","Credential Format":"SD-JWT-VC","Signing Algorithm":"ECDSA","Status Algorithm":"JWT/CWT status list","Key Management (Issuer)":"raw public keys (none jwk)","Key Management (Holder)":"did:jwk","Trust Management":"X.509 certificates"},"x.509":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/credential-profile.json","Name":"x.509","Credential Profile Description":"[Profile description goes here]","Credential Format":"x509","Signing Algorithm":"ECDSA","Status Algorithm":"CRL - certificate revocation list","Key Management (Issuer)":"raw public keys (none jwk)","Key Management (Holder)":"raw public keys (none jwk)","Trust Management":"X.509 certificates"}}},"defs":{"$schema":"http://json-schema.org/draft-07/schema","$id":"defs.json","type":"object","definitions":{"Schema":{"type":"string","description":"JSON Schema URI"},"Filter":{"type":["object","boolean"],"properties":{"Value":{"type":"boolean","description":"Allows to filter this property"},"Description":{"type":"string","description":"Give more information about this property"}},"additionalProperties":false,"required":["Value"]},"Implementation-Support":{"type":"string","description":"Links to SDKs or documentation how to implement it.","$comment":"Objective field, only link to resources. Do not explain like 'easy to implement' since this is subjective."},"IPR-Policy":{"type":"string","description":"What is the policy regarding intellectual properties associated with this technology?"},"Specification":{"type":"string","description":"Where is it specified?"},"Standardization":{"type":"string","description":"Under which Standardization Body and which standards track/status is it standardized?"},"LinkElement":{"type":"object","additionalProperties":false,"properties":{"name":{"type":"string"},"link":{"type":"string","format":"uri","qt-uri-protocols":["https"]}},"required":["link","name"],"title":"LinkElement"}}},"Issuance Protocol":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"issuance-protocol.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the issuance protocol"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"}},"required":["$schema","Name"],"title":"IssuanceProtocol"},"values":{"ACDC":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/issuance-protocol.json","Name":"ACDC"},"ISO 23220-3":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/issuance-protocol.json","Name":"ISO 23220-3"},"Issue Credential v1":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/issuance-protocol.json","Name":"Issue Credential v1","Specification":"https://github.com/hyperledger/aries-rfcs/blob/main/features/0036-issue-credential/README.md"},"Issue Credential v2":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/issuance-protocol.json","Name":"Issue Credential v2"},"OpenID4VCI":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/issuance-protocol.json","Name":"OpenID4VCI","Specification":"https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html"}}},"Key Management":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"key-management.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the method"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Infrastructure for Key Resolution":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is there any infrastructure required to resolve keys and/or validate identifier to key binding?"}]},"Key Rotation":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Can the key referred to in a credential be replaced by another key?"}]},"Key History":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is it possible to retain and obtain the history of keys related to a certain identifier? In case of key rotation it is important for signed credentials to request older keys that are not used for signing anymore"}]},"Party":{"type":"array","items":{"enum":["issuer","holder"]},"description":"What party may uses this technique?","$comment":"We are not looking at verifiers here, since e.g. the identification of the verifier is not part of the credential comparison matrix"}},"required":["$schema","Name"],"title":"KeyManagement"},"values":{".well-known/jwt-issuer":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":".well-known/jwt-issuer"},"cose key":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"cose key","Implementation Support":"https://www.rfc-editor.org/rfc/rfc9052.html"},"credential as secret":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"credential as secret","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder"]},"did:cheqd":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:cheqd","Specification":"https://docs.cheqd.io/identity/architecture/adr-list/adr-001-cheqd-did-method","Implementation Support":"https://docs.cheqd.io/identity/sdk/understanding-sdks","Party":["issuer"]},"did:ebsi":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:ebsi","Implementation Support":"https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/EBSI+DID+Method","Infrastructure for Key Resolution":{"Value":true,"Description":"dlt"},"Key Rotation":true,"Key History":true,"Party":["issuer"]},"did:indy":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:indy","Implementation Support":"https://hyperledger.github.io/indy-did-method/","Infrastructure for Key Resolution":{"Value":true,"Description":"dlt"},"Key Rotation":true,"Key History":true,"Party":["issuer"]},"did:ion (long form)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:ion (long form)","Implementation Support":"https://github.com/decentralized-identity/ion","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder","issuer"]},"did:ion (short form)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:ion (short form)","Infrastructure for Key Resolution":true,"Key Rotation":true,"Key History":true,"Party":["issuer"]},"did:jwk":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:jwk","Party":["holder","issuer"]},"did:keri":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:keri","Implementation Support":"https://weboftrust.github.io/did-keri/","Infrastructure for Key Resolution":{"Value":true,"Description":"witness network"},"Key Rotation":true,"Key History":true,"Party":["holder","issuer"]},"did:key":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:key","Implementation Support":"https://w3c-ccg.github.io/did-method-key/","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder","issuer"]},"did:peer":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:peer","Implementation Support":"https://identity.foundation/peer-did-method-spec/index.html","Party":["holder"]},"did:web":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"did:web","Implementation Support":"https://github.com/w3c-ccg/did-method-web","Infrastructure for Key Resolution":{"Value":true,"Description":"web server"},"Key Rotation":true,"Key History":false,"Party":["holder","issuer"]},"jwks_uri":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"jwks_uri","Infrastructure for Key Resolution":{"Value":true,"Description":"web server"},"Key Rotation":true,"Key History":{"Value":true,"Description":"conditional (with OpenID Connect Federation Key History)"},"Party":["issuer"]},"link secrets":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"link secrets","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder"]},"pub key in X.509 cert":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"pub key in X.509 cert"},"raw public keys (jwk)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"raw public keys (jwk)","Implementation Support":"https://www.rfc-editor.org/rfc/rfc7517","IPR Policy":"https://trustee.ietf.org/documents/trust-legal-provisions/","Specification":"https://www.rfc-editor.org/rfc/rfc7517","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":{"Value":true,"Description":"conditional (with OpenID Connect Federation Key History)"},"Party":["holder","issuer"]},"raw public keys (none jwk)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/key-management.json","Name":"raw public keys (none jwk)","Infrastructure for Key Resolution":false,"Key Rotation":false,"Key History":false,"Party":["holder","issuer"]}}},"Presentation Protocol":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"presentation-protocol.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the presentation protocol"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"}},"required":["$schema","Name"],"title":"PresentationProtocol"},"values":{"OpenID4VP":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/presentation-protocol.json","Name":"OpenID4VP","Specification":"https://openid.net/specs/openid-4-verifiable-presentations-1_0.html"},"Present Proof v2":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/presentation-protocol.json","Name":"Present Proof v2","Specification":"https://hyperledger.github.io/aries-rfcs/latest/aip2/0454-present-proof-v2"},"Present Proof v1.0":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/presentation-protocol.json","Name":"Present Proof v1.0","Specification":"https://github.com/hyperledger/aries-rfcs/blob/main/features/0037-present-proof/README.md"}}},"Signing Algorithm":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"signing-algorim.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"A unique identifier for the signing algorithm"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Standardization (Body, Process)":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Standardization"},"Recognition by government authorities (NIST, BSI, ...)":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the signing algorithm recognized in regulatory frameworks of leading government bodies?"}]},"Performance":{"type":"string","description":"How performant is the signing algorithm?","$comment":"difficult to answer, since there is no performance framework to measure against"},"Hardware support":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the Signing Algorithm supported by common hardware-backed cryptographic implementations, such as Secure Elements, SecureEnclave, HSM, Strongbox, TEE, TPM","$comment":"Using different approaches can lead to different results when choosing key lengths or performance measurements"}]},"Unlinkability-Uncorrelatability-Blind signatures possible":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the Signing Algorithm capable of creating a credential scheme, such that two verification processes can not be linked/correlated by colluding Verifiers/Relying Parties?"}]},"Security strength":{"type":"string","description":"What level of security strength is common and standardized for this signing algorithm?"},"Post-quantum security":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the Signing Algorithm still secure if quantum computing achieves substantial computation power?"}]}},"required":["$schema","Name"],"title":"SigningAlgorithm"},"values":{"BBS+ with public key binding":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/signing-algorim.json","Name":"BBS+ with public key binding","Implementation Support":"https://github.com/mattrglobal/bbs-signatures","Specification":"https://datatracker.ietf.org/doc/draft-looker-cfrg-bbs-signatures/","Standardization (Body, Process)":"DIF (intention to transfer to IRTF CFRG)","Recognition by government authorities (NIST, BSI, ...)":{"Value":false,"Description":"not acknowledged"},"Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Security strength":"381 bit curve","Post-quantum security":false},"BoundBBS+":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/signing-algorim.json","Name":"BoundBBS+","IPR Policy":"barely","Standardization (Body, Process)":"DIF (intention to transfer to IRTF CFRG)","Recognition by government authorities (NIST, BSI, ...)":{"Value":false,"Description":"not acknowledged"},"Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":true,"Post-quantum security":false},"CL":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/signing-algorim.json","Name":"CL","Implementation Support":"Hyperledger Ursa, https://github.com/privacybydesign/gabi ","Specification":"CL-Signatures of there own do not have a formal specification, that is included in Anoncreds","Standardization (Body, Process)":"none","Recognition by government authorities (NIST, BSI, ...)":{"Value":false,"Description":"not acknowledged (independent crypto analysis published)"},"Performance":"Ursa: up to 7 seconds for a validation and approximately 30 seconds for credential definition generation; IRMA (Yivi): both in less than a second","Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":true,"Security strength":"equivalent to RSA2048","Post-quantum security":false},"ECDSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/signing-algorim.json","Name":"ECDSA","Implementation Support":"many mature implementations","Specification":"X9.62-2005","Standardization (Body, Process)":"ANSI","Recognition by government authorities (NIST, BSI, ...)":true,"Hardware support":true,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Security strength":"256 / 384 / 512 bit","Post-quantum security":false},"EdDSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/signing-algorim.json","Name":"EdDSA","Implementation Support":"many mature implementations","Recognition by government authorities (NIST, BSI, ...)":{"Value":true,"Description":"widely accepted, though still behind ECDSA"},"Performance":"high","Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Security strength":"257 / 384 / 512 bit","Post-quantum security":false},"PS":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/signing-algorim.json","Name":"PS","Implementation Support":"Hyperledger Anoncreds, https://github.com/hyperledger/anoncreds-v2-rs ","Specification":"PS-Signatures of there own do not have a formal specification, that is included in Anoncreds-V2","Standardization (Body, Process)":"none","Recognition by government authorities (NIST, BSI, ...)":{"Value":false,"Description":"not acknowledged (independent crypto analysis published)"},"Hardware support":false,"Performance":"medium, faster than CL, slower than Schnorr, single-digit milliseconds for all operations, even in a threshold decentralized setting","Unlinkability-Uncorrelatability-Blind signatures possible":true,"Post-quantum security":false},"RSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/signing-algorim.json","Name":"RSA","Implementation Support":"many mature implementations","Recognition by government authorities (NIST, BSI, ...)":{"Value":true,"Description":"but support is fading"},"Hardware support":true,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Security strength":"2048 / 3072 / 4096 (scales bad)","Post-quantum security":false},"Schnorr":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/signing-algorim.json","Name":"Schnorr","Implementation Support":"many mature implementations","IPR Policy":"patents expired","Specification":"different curves-different specs","Standardization (Body, Process)":"different curves-different standards","Recognition by government authorities (NIST, BSI, ...)":{"Value":true,"Description":"NIST with Curve25519"},"Performance":"high","Hardware support":false,"Unlinkability-Uncorrelatability-Blind signatures possible":false,"Post-quantum security":false}}},"Status Algorithm":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"status-algorithm.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"Unique identifier of the algorithm"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Standardization (Body, Process)":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Standardization"},"Recognition by government authorities (NIST, BSI, ...)":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Is the status algorithm recognized in regulatory frameworks of leading government bodies?"}]},"Category":{"type":"string","description":"Algorithm that behind the implementation of the revocation (Bitlist = each credential has a position in the list. Deny-List: revoked credentials will be added on demand. Accumulator: cryptographic proof the holder presents to show that the credential is not revoked)"},"Performance":{"type":"string","description":"How performant is the revocation mechanism (for issuer, holder and verifier)?","$comment":"For this case there could be some king of test framework"},"Observability":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Does the Verifier have the possibility to observe the revocation status beyond the presentation?"}]},"Traceability":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Does the issuer have possibilities to trace the usage of his issued credentials through the revocation mechanism?","$comment":"With a size of one used element the issuer should always be able to trace the usage of his issued credentials"}]},"Scalability":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"At what scale has the algorithm/technology been demonstrated to work? Are there any known issues?"}]},"Offline Friendliness":{"allOf":[{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Filter"},{"description":"Does the revocation mechanism support an authentication if the holder is offline?"}]}},"required":["$schema","Name"],"title":"RevocationAlgorithm"},"values":{"BBF18-cryptographic accumulator based on RSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"BBF18-cryptographic accumulator based on RSA","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Accumulator","Observability":false},"CRL - certificate revocation list":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"CRL - certificate revocation list","Recognition by government authorities (NIST, BSI, ...)":true,"Category":"Deny-List","Observability":true},"Indy Revocation":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"Indy Revocation","Implementation Support":"Indy SDK","Standardization (Body, Process)":"AnonCreds","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Accumulator","Observability":false,"Scalability":{"Value":false,"Description":"limitations by accumulator size"}},"JWT/CWT status list":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"JWT/CWT status list","Implementation Support":"https://github.com/vcstuff/draft-looker-oauth-jwt-cwt-status-list","Specification":"https://datatracker.ietf.org/doc/draft-terbu-oauth-sd-jwt-vc/","Standardization (Body, Process)":"IETF Individual","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Bitstring","Observability":true,"Traceability":{"Value":true,"Description":"potentially possible with malicious issuer by providing a revocation list with a single entry"}},"Non-Revocation Token":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"Non-Revocation Token"},"RSA-B - cryptographic accumulator based on RSA":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"RSA-B - cryptographic accumulator based on RSA","Implementation Support":"https://github.com/privacybydesign/gabi/tree/master/revocation","Specification":"https://eprint.iacr.org/2017/043.pdf","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Accumulator","Observability":true,"Traceability":false,"Offline Friendliness":true},"SLTD database (travel and identity documents)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"SLTD database (travel and identity documents)","Category":"Deny-List"},"Status List 2021":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"Status List 2021","Implementation Support":"https://github.com/transmute-industries/verifiable-data/tree/main/packages/vc-status-rl-2020","Specification":"https://w3c-ccg.github.io/vc-status-list-2021/","Standardization (Body, Process)":"W3C","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Bitstring","Observability":true,"Traceability":{"Value":true,"Description":"potentially possible with malicious issuer by providing a revocation list with a single entry"}},"VB20 - cryptographic accumulator based on pairings":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"VB20 - cryptographic accumulator based on pairings","Recognition by government authorities (NIST, BSI, ...)":false,"Category":"Accumulator","Observability":false},"Validity Credential":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"Validity Credential"},"medium-term expiration":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"medium-term expiration","Specification":"weeks"},"short-term expiration":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/status-algorithm.json","Name":"short-term expiration","Specification":"minutes"}}},"Trust Management":{"structure":{"$schema":"http://json-schema.org/draft-07/schema#","$id":"trust-management.json","type":"object","additionalProperties":false,"properties":{"$schema":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Schema"},"Name":{"type":"string","description":"A unique identifier for the trust management approach"},"Implementation Support":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Implementation-Support"},"IPR Policy":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/IPR-Policy"},"Standardization (Body, Process)":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Standardization"},"Specification":{"$ref":"https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/main/schemas/defs.json#/definitions/Specification"},"Description":{"type":"string","description":"Explanation or link to a source how this trust management approach works"}},"required":["$schema","Name"],"title":"TrustManagement"},"values":{"EBSI Trust Registries":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/trust-management.json","Name":"EBSI Trust Registries","Description":"Ledger-anchored trust registries"},"IRMA (Yivi) Schemes":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/trust-management.json","Name":"IRMA (Yivi) Schemes","Specification":"https://irma.app/docs/schemes/","Description":"every issuer publishes its keys at a certain URL, the whole structure is signed by a trusted authority"},"OpenID Connect Federation":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/trust-management.json","Name":"OpenID Connect Federation","Standardization (Body, Process)":"OpenID Foundation","Specification":"https://openid.net/specs/openid-connect-federation-1_0.html","Description":"Uses JWTs and REST APIs to represent trust chains and trust marks"},"TRAIN":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/trust-management.json","Name":"TRAIN","Implementation Support":"https://gitlab.cc-asp.fraunhofer.de/train","IPR Policy":"Apache 2.0","Standardization (Body, Process)":"none","Specification":"none","Description":"Uses DNS records and ETSI Trusted Lists for trust management, developed in the EU Project NGI ESSIF-Lab, https://train.trust-scheme.de/info/"},"Trusted Lists":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/trust-management.json","Name":"Trusted Lists","Standardization (Body, Process)":"ETSi","Specification":"https://www.etsi.org/deliver/etsi_ts/119600_119699/119612/02.02.01_60/ts_119612v020201p.pdf","Description":"used by EU Trusted List (https://webgate.ec.europa.eu/tl-browser/)"},"Verified issuer certificate authority list (VICAL)":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/trust-management.json","Name":"Verified issuer certificate authority list (VICAL)","Specification":"ISO 18013-5, Annex C"},"Verifier knows Issuers":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/trust-management.json","Name":"Verifier knows Issuers","Implementation Support":"Manual / bespoke","IPR Policy":"None","Standardization (Body, Process)":"None","Specification":"None","Description":"The verifier knows which issuers he trusts for issuing certain credentials, organizational solution"},"X.509 certificates":{"$schema":"/main/https://raw.githubusercontent.com/openwallet-foundation/credential-format-comparison-sig/schemas/trust-management.json","Name":"X.509 certificates","Implementation Support":"broadly available","Description":"Trust is managed by way of attributes attested in the certificate (e.g. could be role of an issuer) in combination with trust chains. The ultimate entity in the chain is typically trust anchor recipients need to rely in. "}}}} \ No newline at end of file