You are on page 1of 30

1

EBSI, explained – first edition


What are the different chapters of this first edition?

Verifiable Verifiable Decentralised Digital Identity Issuers Trust Open ID Connect Digital Wallets
Credentials Credentials in Identifiers Model for Verifiable
Explained action (DID) Methods Credentials

2
01. Verifiable Credentials explained – Index
What are you going to learn in this Chapter?

Why Verifiable What are Verifiable How do Verifiable


Credentials? Credentials? Credentials work?

3
Why Verifiable Credentials?

4
Verification of documents and information remains challenging.
This is why we need to invest in technology that can help us to easily verify documents and information

17 billion 17 million 30 million 20% ?


Money laundering Illegal products and Stolen / lost Fake labels on food Fake COVID-
through falsification counterfeits documents and beverage 19 tests
110 billion euros are said to According to a report by the In the last years, Interpol has One in five labels in Europe As long as travel restrictions
be laundered in the European European Commission, last seen a sharp uptick in would be false and therefore remain in place due to the
Union through the forging of year, customs seized 17 the number of missing show a lack of compliance pandemic. it is very likely that
documents million items (e.g. passports — within Europe with European rules criminals will seize the
counterfeits) at the borders of and around the globe. In opportunity of producing and
Europe for a total value of 740 Europe the amount reached selling fake COVID-19 test
million euros. 30 million in 2015 and +60 certificates. Several cases
million in the world. The latest have already emerged of
would be estimated to 89 fraudulent COVID-19 test
million in 2020 (Interpol). certificates being sold to
travelers (Europol)

5
Documents are easy
to fake and difficult to
verify.

The creation of
national registers was
a major advancement
to distinguish fake
from real information.

6
Authentic data sources are now digital and online
But real-time access is often not possible, this is done by intermediaries

Verification by accessing the authentic sources of information is often intermediated (i.e. an entity on behalf of another entity)

Population Register

Internet + Secure Data


Exchange protocol

Citizen Gov Entitites


Verifier Vehicles Register
Holder / Requester Issuer

Business Register

7
Direct verification/ self-sovereign scenario.
A new pattern for sharing information

Issuer Holder Verifier


Issuance of Presentation of

Information Information

Storage in
Digital wallet

EBSI Ledger

8
Challenges associated to the self-sovereign scenario.
Technology can help

We aim at significantly easing the verification of information in a Citizen to Business (C2B)


and Citizen to Government (C2G) context. VERIFIABLE CREDENTIALS are an essential but not
sufficient element to achieve this objective . There are two other challenges:

Issuer Holder Verifier


• Business or
Verifiable Credentials must be Verifiable Credentials must be • Government
supplemented by a Trust Model supplemented by a trusted (Digital)
for Issuers Identity of Citizens

Can I trust the Issuer of the Can I trust who is presenting the
Verifiable Credential? Verifiable Credential?

9
Three key technologies
Three components to benefit from the next evolution of the Web3.

Verifiable Credentials Blockchain/ ledger Digital Wallet


A new way of expressing A new decentralised A new way to interact
information infrastructure for/with citizens
Metadata
Claims
Proofs (signatures)

10
Why invest in these technologies?
Almost impossible to fake but easy to verify

Almost impossible to fake but easy to verify

High level of certainty that the issuer is trusted alongside the


Verifiable Credentials time of issuance, expiry date, etc.
are becoming the de
facto standard High level of certainty that the holder is the one that the
because… Verifiable Credential was issued to.

Verifiers have easy access to information but the holder


keeps data control and ownership with possibility of
partial disclosure of information.

11
What are Verifiable
Credentials?

12
Verifiable Credentials can be used in many Citizen journeys
Verifiable Credentials can be used in almost all types of Citizen Journeys

Identity Education Social Security

Holders Becoming a resident Applying for Master Applying for a job Working abroad

Issuers
Government entity A University A University A Social Security Institution

Verifiable Credentials
in the wallet
ID Credential Educational Credential Educational Credential PD-A1

Verifiers

Government entity B University B Employer Inspector

13
Three key ingredients
Three components to benefit from the next evolution of the Decentralised Identity.

Verifiable Credentials Verifiable Data Digital Wallet


Registries
A new way of expressing A new decentralised A new way to interact
information Infrastructure for for/with citizens
establishing trust

14
Trusted Issuer Holder Verifier
Accreditation
Organisation

On-boarding • Setting up wallets and creation DIDs


• Registration of DIDs on EBSI
of actors • Accreditation of issuers of VCs

• Request issuance of VC
1. Issuance & storage • Issuance of VC
• Storage of VCs

2. Presentation & •

Request of Verifiable Presentation
Sharing of Presentation
verification • Verification of Claims

15
Verifiable Credentials, the basic information sharing scenario
A new pattern for C2B and C2G information exchange

Verifiable Credentials enable a C2G and C2B Information sharing model

Issuer Holder Verifier

Issuance of Presentation of

Verifiable Credential Verifiable Presentation

Storage in
Digital wallet

underpinned by a DIGITAL IDENTITY for Holders + Verify Issuer’s authenticity and


accreditation status
TRUST MODEL for Issuers of Verifiable Credentials

Public Keys of Issuers

Register of Issuers

CRL (*) * List of revoked keys and Accreditations 16


Verifiable Credentials, the challenges
A new pattern for C2B and C2G information exchange

Verifiable Credentials aim at significantly easing the verification of information in a Citizen to


Business (C2B) and Citizen to Government (C2G) context. VERIFIABLE CREDENTIALS are an
essential but not sufficient element to achieve this objective. There are two other
challenges:

Issuer Holder Verifier


• Business or
Verifiable Credentials must be Verifiable Credentials must be • Government
supplemented by a Trust Model supplemented by a trusted (Digital)
for Issuers Identity of Citizens

Can I trust the Issuer of the Can I trust who is presenting the
Verifiable Credential? Verifiable Credential?

17
Why Verifiable Credentials?
Impossible to fake but easy to verify

Impossible to fake but easy to verify

High level of certainty that the issuer is trusted alongside the


Verifiable Credentials time of issuance, expiry date, etc..
are becoming the de
facto standard High level of certainty that the holder is the one that the
because… Verifiable Credential was issued to.

Verifiers have easy access to information, but the holder


keeps data control and ownership with possibility of
partial disclosure of information.

18
How do Verifiable
Credentials work?

19
Verifiable Credentials, the scenario.
A new pattern (distributed and decentralised) for exchanging information

Issuer 1 Holder 2 Verifier


DID DID
Issuance of Presentation of

Verifiable Credentials Verifiable Presentation

Open ID Connect Protocol Open ID Connect Protocol


Storage in
Digital wallet

Register public information, Verify Issuer’s authenticity and


DID(s) and Accreditations accreditation status

Public Keys of Issuers

Register of Issuers

CRL
20
How does it work?
Step 0. Issuers are onboarded, wallets are setup and verifiers environments are established

Issuer Holder Verifier


DID DID

Verifiable Credential Verifiable Presentation

• Registration of self-issued Public


Keys and DID (as part of a DID • Selects an EBSI conformant
• No specific onboarding* or set-
document) on EBSI wallet
up apart from the creation of a
• Accreditation of issuers of VCs • Wallet generates DIDs, Public
Verifier App that can exploit
by Trusted Accreditation and a Private keys. All of them
part of a DID documents stored EBSI’s APIs and interact with
Authorities (TAOs)
EBSI conformant wallets
• Registration of Issuers in EBSI’s on the wallet
issuer register

* Verifier trust model is not required by the existing use cases, but it can be supported. 21
How does it work?
Step 1. Issuance of a Verifiable Credential which is then stored on an EBSI conformant wallet

Issuer 1 Holder 2 Verifier


DID DID Presentation of

Verifiable Credential Verifiable Presentation

What does it contain?


> The DID of the entity that issues the credential
Credential Metadata > The status of the credential (Issuance date, Expiration date)

> The DID of the Holder of the credential


Claim(s) > The claims about the subject (What the issuer asserts about the subject)

> Digital proof to make the credential tamper-evident (One or more


Proof (signature of Issuer) cryptographic proofs that can be used to detect tampering and verify
the authorship of a credential).

22
How does it work?
Step 2. Presentation of a Verifiable Credential for verification

Issuer 1 Holder 2 Verifier


DID DID
Issuance of Presentation of

Verifiable Credentials Verifiable Presentation

What is checked?
Checks that the holderof the
DID of the Holder VC is the one presenting it

Check time of issuance, if


Credential Metadata Credential Metadata expired

Check the claims about the


Claim(s) Claim(s) subject

Check the signature of the


Proof (signature of Issuer) Proof (signature of Issuer) Issuer

Check the signature of the


Proof (signature of Holder) Holder

Check the issuer


23
Check Issuer’s accreditation
accreditations
Standards and recommendations
EBSI invests in the dissemination of industry recognised Standards

W3C standards and OpenID Connect eIDAS JWT RFC family


recommendations

• Decentralized Identifiers v1 • OpenID Connect SIOP v2 • JAdES • IETF RFC 7515-7520


• Verifiable Credentials Data Model v1.1 • OpenID Connect for Verifiable Presentations • eID authentication and identification
• Presentation Exchange v2 • OpenID Connect for Verifiable Credentials Issuance

24
Three Trust models of Issuers of Verifiable Credentials
Scalability, flexibility and interoperability

Centralised Trust Model Federated Trust Model Distributed Trust Model

EU Gateway eIDAS Trusted Lists

Possible to
Public Keys of Issuers combine with
DID Document
X.509 X.509 X.509
Register of Issuers

CRL

The Commission can manage a The eIDAS regulation has put in EBSI leverages blockchain and W3C’s
centralised service responsible place a EU-wide list of all providers Decentralised Identifier standard to
for managing and distributing of qualified certificates. This list create a fully distributed trust model
the certificates of issuers of can be used to support the where each sector or Member State
electronic documents. verification of information about defines and manages the issuer
issuers of electronic documents. accreditations of electronic documents.

Important note! Combination of trust models is possible


25
Can we compare the Issuers’ Trust Model?

Centralised Trust Model Federated Trust Model Distributed Trust Model


A Central authority, e.g. the The eIDAS regulation has put in place Leveraging blockchain and W3C’s
Concept Commission, manages a centralised a EU-wide list of all providers of Decentralised Identifier standard to
service responsible for managing and qualified certificates. This list can be create a fully distributed trust model
distributing the certificates of issuers used to support the verification of where each sector or Member State/
of electronic documents. information about issuers of Region/ etc. defines and manages the
electronic documents. issuers of electronic documents without
any the need for a Central Authority.

Example EU Gateway eIDAS Trusted Lists EBSI

Possible to combine with


Technology DID documents X.509 Certificates
X.509 Certificates X.509 Certificates
Verifiable Accreditations

This is hierarchical and not that flexible This is a federation of Centralised Trust The model enables decentralisation and
Governance requiring many roles: Certificate Models which comply to a common set of greater flexibility. Only two roles are
Authority, Registration Authority, requirements. Nonetheless the foundation is required: Trusted Accreditation Organisation
Validation Authority, Distribution similar with greater scalability and (TAO) and Trusted Issuer (TI)
Authority
interoperability.

Control of service Interoperability Flexibility


Strength The eIDAS List Of Trusted Lists provides a • Rotation of keys allows issuers to minimise the
The delivery of service is centered
around a Central Entity. As a result reliable cornerstone to securely access all number of revoked Verifiable Credentials as a
rollout can be much faster than the EU trusted lists and promoting cross -border consequence of the revocation of the Issuer’s
other models. interoperability signing keys.
• Can be combined with classical X.509/ PKI.
• Can also support both Centralised and
Federated trust models. 26
The Holder’s Digital Identity verification
There are 3 different approaches for digital identity

My Identity

Digital Identity

Centralised Approach Federated Trust Model Distributed Trust Model

National eID means Trusted Identity networks European Self Sovereign Identity (ESSIF)

eIDAS Nodes for Verifiable ID


eID means
mutual (Verifiable Credential
• National
authentication using eIDAS common
• Sectorial
(common data data set)
• … set + SAML)

Important note! EBSI conformant wallets and Verifier Apps are encouraged to support several
approaches for verification of Digital Identity 27
Wallets mediate almost all user interactions.
The vast majority of interactions to exchange VCs depend on the wallet

Digital wallets

28
Want to know more?
Key ressources

Check the EBSI website Check the EBSI Check the EBSI
Playbook Demo Day
https://ec.europa.eu/digital-building- https://ec.europa.eu/digital-building- https://ec.europa.eu/digital-building-
blocks/wikis/display/EBSI/Home blocks/wikis/display/EBSIDOC/EBSI+Ve blocks/wikis/display/EBSI/EBSI+Demo+
rifiable+Credentials+Playbook Day
https://ec.europa.eu/ebsi

You might also like