nChain Identity
Back to All
  • nChain Identity user documentation
  • 📑INTRODUCTION
    • Introduction to nChain Identity
    • Why choose nChain Identity?
      • DiD differentiators
    • How does nChain Identity work?
      • Data flows
      • Use cases and applications
    • Standards and regulations
  • 📄nChain Identity Issuers
    • What is an issuer?
    • How to become an issuer?
    • Operating an issuer
    • What do issuers do?
    • Issuer API
      • Overview
      • Getting Started
      • Examples
        • Issue an email credential
        • Revoke a claimed email credential
      • API Documentation
        • Credential Offers
        • Agent
        • Claims
  • 📑NCHAIN IDENTITY VERIFIER
    • What is a Verifier?
    • Operating a verifier
    • How to become a verifier?
    • Verifier API
      • Overview
      • Getting Started
      • Examples
        • Verify an email credential
      • API Documentation
        • Verifiable Presentation
        • Verifying
        • Agent
        • SIOP
        • Templates
  • 📄NCHAIN IDENTITY WALLET
    • What is the wallet for?
    • How to receive a Verifiable Credential?
    • How to share a Verifiable Credential?
  • 📑Privacy and Security
    • Privacy and Security Measures: NChain Identity Services
    • Revocation and data deletion
  • 🗃️SELF-SOVEREIGN IDENTITY KNOWLEDGE
    • Self-Sovereign Identity
    • Actors
    • Decentralized vs Self-Sovereign Identity
    • Key Principles of Self-Sovereign Identity
    • Self-Sovereign Identity – Use Cases
    • Digital Trust
    • Some of the critical components of Self Sovereign Identity
      • Trust over IP
    • Some of the critical components of Decentralise ID
      • A Blockchain Tailored for Decentralized Identity
      • Decentralise Identifiers (DiD)
      • Verifiable Credentials
      • Verifiable Presentations
  • 📑GLOSSARY
    • Glossary
  • 📄FAQs / HELP
    • Help & FAQs
      • What is a digital identity?
      • What is nChain Identity, and how does it work?
      • How is blockchain used in nChain Identity?
      • Compatible Blockchains for nChain Identity.
      • How can my business sign up for nChain Identity?
      • How is nChain Identity different to other identity solutions in the market?
      • Can nChain Identity communicate with other identity solutions?
      • What is nChain Identity doing with my data, and does it act as a data processor or controller?
      • What measures does nChain Identity take to protect user data?
      • What support is available for nChain Identity?
      • Can nChain Identity be integrated into our existing systems?
      • How can I get started with nChain Identity?
      • What countries is nChain Identity available in?
Powered by GitBook
On this page
  • Interoperable data
  • Standards for Verifiable Credentials and Decentralised Identifiers
  1. INTRODUCTION

Standards and regulations

W3C - V.C - V.P - DID

PreviousUse cases and applicationsNextWhat is an issuer?

Last updated 3 months ago

nChain Identity's SSI solution— Verifier, Issuer, and Identity Wallet—is built modularly. Each phase of development builds upon the previous one, ensuring continuous progress while remaining flexible to new insights, ongoing testing, and user feedback. The process iterates and improve balancing cost and perceived value. nChain Identity has an open roadmap approach with constant feedback and validation of requirements to deliver an optimal product.

Interoperable data

The nChain Identity Platform is constructed on open standards. Allowing individuals to securely store their credentials on nChain Identity digital wallet that complies with the standards. Additionally, it ensures that any party can authenticate the data's legitimacy regardless of geographical location, provided their verification system aligns with these standards.

Standards for Verifiable Credentials and Decentralised Identifiers

A Verifiable Credential (VC) serves as a standardised method to digitally articulate credentials (claims) in a tamper-proof and privacy-preserving manner, ensuring machine-verifiability. Published by the W3C in 2019, the Verifiable Credentials Data Model establishes the foundation for this approach.

As per the W3C, decentralised Identities represent a fresh identifier category that facilitates verifiable, decentralised digital identity. DIDs operate autonomously of any organisation or identity provider, providing creators with complete control. Each DID is equipped with a cryptographic key pair, where the Issuer's Private Key signs the Verifiable Credential, and the Public Key is openly available on the blockchain. This methodology enables a Verifier to consult the blockchain for the Issuer's DID and associated Public Key when verifying the authenticity of a Verifiable Credential.

📑
W3C Verifiable Credential
The Verifiable Credentials Standard
The Decentralised Identifier (DID) Standard