← Back to Demos

Articles & Resources

Learn about verifiable credentials, legal frameworks, and technical concepts

Glossary of Terms

Key concepts in the verifiable credentials ecosystem

Verifiable Credentials (VCs)

Digital credentials that are cryptographically secure, tamper-proof, and instantly verifiable. Unlike physical documents or PDFs, verifiable credentials can be verified without contacting the issuer.

Examples:

  • Digital driver's license
  • Student ID card
  • Professional certification
  • Medical fitness certificate

Decentralized Identifiers (DIDs)

Unique identifiers that are created, owned, and controlled by individuals or organizations without relying on a central authority. DIDs enable self-sovereign identity.

Examples:

  • did:indy:bcovrin:testnet:NxbvVcdwR5a2oyiYa6UbPP
  • did:peer:2.Vz6Mkm8gVQkqR12HghHmiDXHG92...

Issuer

An organization or authority that creates and issues verifiable credentials. Issuers cryptographically sign credentials to prove their authenticity.

Examples:

  • Universities issuing degree certificates
  • Government agencies issuing driver's licenses
  • Medical centers issuing fitness certificates
  • Professional bodies issuing membership credentials

Holder

An individual or entity that receives, stores, and presents verifiable credentials. Holders have full control over their credentials and decide when and with whom to share them.

Examples:

  • Students with digital student IDs
  • Graduates with degree certificates
  • Professionals with membership credentials

Verifier (Relying Party)

An organization that requests and verifies credentials from holders. Verifiers can cryptographically confirm credential authenticity without contacting the issuer.

Examples:

  • Employers verifying job applicant qualifications
  • NYSC verifying student academic credentials
  • Insurance companies verifying driver's licenses
  • Banks verifying customer identity

Digital Wallet

A secure application that stores verifiable credentials and enables holders to manage and share their credentials. Wallets protect private keys and facilitate credential presentations.

Examples:

  • Confirmd Mobile Wallet
  • Browser-based credential wallets

Proof Request

A request from a verifier asking a holder to present specific attributes from their credentials. Holders can choose to accept or reject proof requests.

Examples:

  • Loan application requesting student credentials
  • NYSC registration requesting academic results
  • Employer requesting degree verification

Proof Presentation

The act of a holder sharing requested credential attributes with a verifier. Presentations include cryptographic proofs that verify authenticity without revealing the full credential.

Examples:

  • Student sharing name, matric number, and graduation year
  • Graduate proving degree class without sharing full transcript

Schema

A template that defines the structure and attributes of a credential type. Schemas specify what data fields a credential contains.

Examples:

  • Student Card Schema: name, matric number, department, graduation year
  • Driver's License Schema: name, license number, expiry date, class

Credential Definition (CredDef)

A specification created by an issuer based on a schema. The credential definition includes cryptographic keys used to sign and verify credentials of that type.

Examples:

  • University of Lagos Student Card CredDef based on Student Card Schema
  • FRSC Driver's License CredDef based on Driver's License Schema

Self-Sovereign Identity (SSI)

An identity model where individuals own and control their digital identities without relying on centralized authorities. Users decide what information to share and with whom.

Zero-Knowledge Proof (ZKP)

A cryptographic method that allows proving a statement is true without revealing the underlying information. Enables privacy-preserving credential verification.

Examples:

  • Proving you're over 18 without revealing your exact birthdate
  • Proving you have a degree without sharing your grades

DIDComm

A secure, encrypted messaging protocol for communication between decentralized identities. Used for credential issuance and proof exchanges.

Credential Lifecycle

The complete journey of a credential from creation to expiration: issuance, storage, presentation, verification, renewal, and revocation.

Revocation

The process of invalidating a previously issued credential. Revoked credentials can no longer be successfully verified, even if the holder still possesses them.

Examples:

  • Revoking a driver's license after suspension
  • Revoking employee credentials after termination
  • Revoking expired certifications

Out-of-Band (OOB) Invitation

A mechanism to establish connections between wallets and issuers/verifiers outside of the normal DIDComm flow. Often delivered via QR codes or deep links.

Examples:

  • Scanning QR code to connect wallet to platform
  • Clicking email link to receive credential

Ready to See It in Action?

Try our interactive demos to experience verifiable credentials firsthand

Explore Demos