Articles & Resources
Learn about verifiable credentials, legal frameworks, and technical concepts
Glossary of Terms
Key concepts in the verifiable credentials ecosystem
Verifiable Credentials (VCs)
Digital credentials that are cryptographically secure, tamper-proof, and instantly verifiable. Unlike physical documents or PDFs, verifiable credentials can be verified without contacting the issuer.
Examples:
- Digital driver's license
- Student ID card
- Professional certification
- Medical fitness certificate
Decentralized Identifiers (DIDs)
Unique identifiers that are created, owned, and controlled by individuals or organizations without relying on a central authority. DIDs enable self-sovereign identity.
Examples:
- did:indy:bcovrin:testnet:NxbvVcdwR5a2oyiYa6UbPP
- did:peer:2.Vz6Mkm8gVQkqR12HghHmiDXHG92...
Issuer
An organization or authority that creates and issues verifiable credentials. Issuers cryptographically sign credentials to prove their authenticity.
Examples:
- Universities issuing degree certificates
- Government agencies issuing driver's licenses
- Medical centers issuing fitness certificates
- Professional bodies issuing membership credentials
Holder
An individual or entity that receives, stores, and presents verifiable credentials. Holders have full control over their credentials and decide when and with whom to share them.
Examples:
- Students with digital student IDs
- Graduates with degree certificates
- Professionals with membership credentials
Verifier (Relying Party)
An organization that requests and verifies credentials from holders. Verifiers can cryptographically confirm credential authenticity without contacting the issuer.
Examples:
- Employers verifying job applicant qualifications
- NYSC verifying student academic credentials
- Insurance companies verifying driver's licenses
- Banks verifying customer identity
Digital Wallet
A secure application that stores verifiable credentials and enables holders to manage and share their credentials. Wallets protect private keys and facilitate credential presentations.
Examples:
- Confirmd Mobile Wallet
- Browser-based credential wallets
Proof Request
A request from a verifier asking a holder to present specific attributes from their credentials. Holders can choose to accept or reject proof requests.
Examples:
- Loan application requesting student credentials
- NYSC registration requesting academic results
- Employer requesting degree verification
Proof Presentation
The act of a holder sharing requested credential attributes with a verifier. Presentations include cryptographic proofs that verify authenticity without revealing the full credential.
Examples:
- Student sharing name, matric number, and graduation year
- Graduate proving degree class without sharing full transcript
Schema
A template that defines the structure and attributes of a credential type. Schemas specify what data fields a credential contains.
Examples:
- Student Card Schema: name, matric number, department, graduation year
- Driver's License Schema: name, license number, expiry date, class
Credential Definition (CredDef)
A specification created by an issuer based on a schema. The credential definition includes cryptographic keys used to sign and verify credentials of that type.
Examples:
- University of Lagos Student Card CredDef based on Student Card Schema
- FRSC Driver's License CredDef based on Driver's License Schema
Self-Sovereign Identity (SSI)
An identity model where individuals own and control their digital identities without relying on centralized authorities. Users decide what information to share and with whom.
Zero-Knowledge Proof (ZKP)
A cryptographic method that allows proving a statement is true without revealing the underlying information. Enables privacy-preserving credential verification.
Examples:
- Proving you're over 18 without revealing your exact birthdate
- Proving you have a degree without sharing your grades
DIDComm
A secure, encrypted messaging protocol for communication between decentralized identities. Used for credential issuance and proof exchanges.
Credential Lifecycle
The complete journey of a credential from creation to expiration: issuance, storage, presentation, verification, renewal, and revocation.
Revocation
The process of invalidating a previously issued credential. Revoked credentials can no longer be successfully verified, even if the holder still possesses them.
Examples:
- Revoking a driver's license after suspension
- Revoking employee credentials after termination
- Revoking expired certifications
Out-of-Band (OOB) Invitation
A mechanism to establish connections between wallets and issuers/verifiers outside of the normal DIDComm flow. Often delivered via QR codes or deep links.
Examples:
- Scanning QR code to connect wallet to platform
- Clicking email link to receive credential
Ready to See It in Action?
Try our interactive demos to experience verifiable credentials firsthand
Explore Demos