Arnaud Le Hors: I've been working on standards and open source development for over 25 years, both as a staff member of standards development organizations (SDO) such as W3C and the X Consortium, as well as a representative for IBM. I'm currently Senior Technical Staff Member (STSM) Web & Blockchain Open Technologies at IBM and part of Hyperledger's Technical Steering Committee (TSC). ✪
Topic: Announcements
Virtual hackathon and credentials outreach planned for this summer ✪
If you want to be involved tell ChristopherA when you are NOT available ✪
Decentralised conference is meeting first week of Aug, so outreach may be planned to mesh with this ✪
Midata conference is last week of August in Helsinki ✪
ZKLang is a language for mapping VCs to cryptographic algorithms ✪
Uses zero knowledge proof of knowledge statements ✪
So instead of prooving age is GT 21, because it is a hidden message in an anonymous credential then instead would ask if hidden message m1 contained an interger between 22 and 100 ✪
Drummond Reed: Manu, that makes sense to me: that any data external to a credential has a pointer and zklang would treat that pointer as data it describes. ✪
Manu Sporny: Drummond, yes... I'm trying to do a gap analysis between ZKLang and what we'd need to shove into the `proof` block in a Verifiable Presentation (which used to be called a Verifiable Profile). ✪
Kim Hamilton Duffy: Is it clear where the mappings to m1, m2, ... is happening? ✪
Or if hidden message contains date of birth, you would ask if the difference between this and today's date is greater than 21 ✪
Lionel Wolberger: Please repost updated link to presentation ✪
All fields in a VC have to mapped down to integers in ZKlang ✪
Nathan George: A note that the issues around types and encodings that are are unaddressed in JSON-LD and the issues with mapping to proof of possession instead of disclosing the signature that we've talked about in the VCWG are relevant to why we have been helping pursue this approach ✪
Note in Slide 15, the prover is what we call the holder ✪
Manu Sporny: JanCamenisch, Nathan, are we doing anything in our VCWG work that would block ZKLang from working? ✪
Drummond Reed: I like that term: "verifiable presentation object" ✪
Ans: no, our current approach is facilitating it ✪
Nathan George: Agreed, that the "proof request" object is an important part of how our protocol works, but has been out of scope for the VC data model ✪
Manu Sporny: Kimhd, no, nothing to do w/ that issue. ✪
Nathan George: We talk about the protocol negotiating between an offer->request->offer->request->return the object (for both credentials and proofs) ✪
Kim Hamilton Duffy: I can't find anything on "Verifiable Presentation" ✪
Manu Sporny: Kimhd, What we call "Verifiable Profile" now is going to change to "Verifiable Presentation" per the VCWG F2F discussion. ✪
Dave Longley: Seeing real examples in JSON-LD (exactly what Verifiable Presentation and Verifiable Credentials could look like with ZKLang) in an issue would be really helpful -- and if there are places where the mapping isn't clear those areas could be marked and others more steeped in the data model stuff could jump in and help ✪