<christopher_allen> has any voice started? All is quiet.
Harrison_Tang: So hello everyone welcome to this week's w3c ccg meeting so today our main topic we actually invited Dan Yamamoto Causeway Socko uh yeah Suzuki and ug Suga to come here and present the link database verifiable credential with selected disclosures on the accessibility. ✪
Harrison_Tang: Before we get to this man agenda just want to do some admins first but want to thank them in advance for jumping out here because it's actually one am Japan time so so this is definitely quite an honor for them to actually join us as w3c she G here today. ✪
<kimberly_wilson_linson> Christopher - you might need to reboot. We have audio
Harrison_Tang: Right so quick agenda just want to do some quick reminders for the code of ethics and professional conduct reminder and yeah they know I think we've been doing very well just make sure that we remain respectful to one another never seen he did you know kind of disrespectful arguments in this channel before but just want to do a quick reminder again all right IP note anyone can participate in these calls however. ✪
Harrison_Tang: Gigi walk items must be members of the ccg with for IP our agreement sign so you have any questions about that just reach out to any of the cultures. ✪
Harrison_Tang: All right these calls are recorded and it's automatically transcribed and we try to publish the transcription within a couple days. ✪
<kazue> present +
Harrison_Tang: Use the Gchat to Q speakers so you can type in Q Plus to add yourself to the queue or q- to remove it and you can do Q question mark to see who is in the cube all right let's get to the introductions and reintroductions anyone who is new to the all right Greg. ✪
Topic: Introductions and Reintroductions
Harrison_Tang: Thank you Greg and then I probably would like to follow up with you later maybe this week to see if we could schedule a session on PBS in the church later this year yeah. ✪
Harrison_Tang: All right then do you mind kind of introduce yourself a little bit since you're the main main speaker today yeah. ✪
Harrison_Tang: Thank you thank you Dan and Kazooie do you mind actually introduce yourself a little bit thank you. ✪
Harrison_Tang: Is the honor for you guys to join us and sorry to call on us UK I do you mind and hopefully I pronounced your name correctly but do you mind actually unmute and introduce yourself a little bit. ✪
Harrison_Tang: Thank you thank you I mean it's 1 a.m. in Japan so I totally understand and lastly you g do you mind actually I'm you and introducers introduce yourself a little bit. ✪
Harrison_Tang: Any other announcements and reminders. ✪
Harrison_Tang: Okay what about updates on the work items. ✪
Harrison_Tang: All right so let's get you the man agenda again we're very very honor to have Dan Causeway she Gaya and Yugi to present on the topic of linked database verifiable credentials with selected disclosures I'm going to ability and predicate proves actually just want to give a quick shout-out to Christopher to actually I was chatting with Christopher about our. ✪
Harrison_Tang: and calendar and then he is the one who actually. ✪
Topic: Data Integrity-based Selective Disclosure and Predicate Proofs
Harrison_Tang: Reduce Dan Causeway and others to to us so a quick shout out to him and as we know selected disclosure unlinked ability part of the predicate proves and these kind of concepts are important topics in our community so very very happy to have Dan and others actually take the time to stay out until like 1:00 2:00 a.m. Japan time to give this talk so let's give them the. ✪
Harrison_Tang: a quick shout-out virtual clap clap Santa. ✪
Harrison_Tang: And I think the floors yours then. ✪
Harrison_Tang: Oh yes honey do you have any comments. ✪
<kazue_sako> Bullet proofs can be combined to prove arbitrary range, a<x<b
<manu_sporny> ^ @Christopher, averages are super important for variations of "K-anonymity"
<christopher_allen> ^ @manu, precisely! I think in Taiwan they say that health data is considered anonymous (legally) if it is in groups of at least 300.
<manu_sporny> @Greg -- important to know that -- that is, "theft of ZKP VC can result in impersonation" -- which can be counteracted (to some degree) with a binding to a private key (presuming private key isn't stolen as well).
<kazue_sako> Gregg, I think you meant that holder does not need secret key of the issuer! Indeed.
<greg_bernstein> Theft, impersonation, are problems...
<kazue_sako> So Holder has his own secret key to prove that he is 'correct', that is a binding VC.
<manu_sporny> @Kazue yes, that's what I understood as well. also, hi! Long time no see! Thank you for saving me the last time I was in Japan! :)
<christopher_allen> ^ @manu I'm also looking into how these sd/anti-correlation techniques can also be integrated into did:docs.
<kazue_sako> Dan and my students are working on those binding VC.
<manu_sporny> @Kazue good to know -- very important from a use case perspective... the re-mapping stuff that DanY is covering right now is vitally important as well.
<kazue_sako> My student is working on using CHAPI and issue binding VC using blind signatures!
<manu_sporny> ^ oh, very interesting! Let us know how we can help!
<greg_bernstein> Very interesting Kazue!
<manu_sporny> One of the harder problems is the presentation request language... how does a Verifier ask for the ZKP fragments that Dan is mentioning.
Phil_L_(P1): Yes I didn't hear what you didn't hear your voice can you hear. ✪
Phil_L_(P1): Okay well thank you very much I have a really perhaps naive question but I'm wondering what prevents the second credential with the particular information about the vaccine from being something borrowed from a third party and not really the individuals and I'm wondering if the end quad term Wise Construction that you've described is what is preventing that sort of connection of a second. ✪
Phil_L_(P1): Individual of the first credential if that makes sense. ✪
<christopher_allen> The combination of binding the 2nd VC to the 1st is unique per presentation, so it can't be correlated.
<christopher_allen> ^ @Dan I'm trying to collect more scenarios for SD/non-corellation use cases.
Phil_L_(P1): I understand the selective disclosure part and the end of the hiding of particular pieces of it I think you were saying that the that the proof method also proves that the credential subject in the first credential is the credential subject in the second credential is that right. ✪
Phil_L_(P1): The other words if I if I'm the person and X2 and your person your as a separate person that has this vaccine what prevents me from using that the the vaccine that you got as as my claim that I have gotten it when and I'm not selectively preventing disclosure of these other pieces of information I still want to make sure that it's that that original person is the. ✪
Harrison_Tang: And you want to make some concluding comments. ✪
<christopher_allen> @Dan your fluency is great!
<kerri_lemoie> That was excellent. Thank you!
Harrison_Tang: No no thank you I think your English is perfect so thank you for taking the time and thanks again then Kazooie she Gaya ugj for actually coming here they and I didn't fly almost 2 a.m. in Japan some thank you thank you for coming here at w3c shiji today. ✪
Harrison_Tang: All right so this concludes this week's at w3c shiji meeting if you want to see what's coming just go to the content calendar that I sent out every week right have a good one thank you bye. ✪