This document outlines the use cases and requirements for an issuer to express a list of recognized entities and their corresponding actions, such as issuing and verifying.
There was extensive analysis of existing initiatives performed at the Rebooting the Web of Trust 11 conference in The Hague as well as a number of follow-on meetings to coordinate activity across various communities. The paper analyzing the existing state of the art is available from the Rebooting The Web of Trust paper archive.
This document and its corresponding specification is intended to align with work happening in other venues such as the Trust Over IP Foundation, ESSIF-Lab, The European Digital Identity Initiative and other European Trust Frameworks, and Canadian Trust Framework activities, as well as commercial ventures that are exploring Trust Frameworks. Effort will continue to be expended to align this specification with work happening in other related venues. The authors and editors of this specification invite commentary on this specification through the Github issue tracker listed at the top of this document.
Lists of Verifiable Issuers, sometimes referred to as Trusted Registries, are a well-known concept from the pre-internet age. Whenever there is a diploma signed by a university, there are people and organizations that keep track of what universities exist and what methods exist to confirm the authenticity of that diploma. A list could be maintained by HR staff for the purpose of hiring personnel based on qualifications asserted by particular Verifiable Issuers, and the governance of that list would be minimal. Another list could be maintained by a government, associated with well-governed accreditation procedures, for the purpose of assuring that a diploma represents a proper education. Lists of Verifiable Issuers support Verifiers in their decision to rely on the Issuer of a Verifiable Credential that is presented by a Holder.
Digitally sharing lists of Verifiable Issuers and Verifiers is a relatively new concept. Examples are the list of parties that are allowed to use the digital fingerprint information on the chip of RFID-based digital passports. This is cryptographically enforced: “chip-says-no” when an unauthorized party attempts to access the information on the chip. eIDAS v2 will also have a Verifiable-Verifiers List that limits the access of Verifiers to credentials in a EUDI (EUropean Digital Identity) wallet. Verifiable-Verifiers Lists support Holders and holder implementations in their decision to trust a Verifier to share a Verifiable Presentation to that Verifier.
Lists of Verifiable Issuers and Verifiers help to automate the decision process of whether to engage with a counterparty in a transaction and make it more auditable by ensuring that software can note that a party was on a list before engaging with them. This paper contains the following sections that provide background on the problem space and requirements to address it:
The target audience of this paper is people that know the basics of Self-Sovereign Identity (SSI) (such as the concepts of [=issuer=], [=holder=], [=verifier=], and [=verifiable credential=]) and want to learn about the use cases that require the publication of lists of recognized issuers and verifiers.
The following terms are used to describe concepts in this document.
Credential
A set of one or more claims made by an issuer. A verifiable credential is a tamper-evident credential that has authorship that can be cryptographically verified. Verifiable credentials can be used to build verifiable presentations, which can also be cryptographically verified. Any single credential can include claims about one or more different subjects.
Electronic Identification, Authentication and Trust Services (eIDAS)
eIDAS (electronic IDentification, Authentication and trust Services) is an EU regulation on electronic identification and trust services for electronic transactions in the European Single Market. It was established in EU Regulation 910/2014 of 23 July 2014. All organizations delivering public digital services in an EU member state must recognize electronic identification from all EU member states from September 29, 2018.
European Digital Identity (EUDI)
The European Digital Identity is based on a European Commission document called “European Digital Identity Architecture and Reference Framework” that has established the functional and architectural requirements for an upcoming European Digital Identity Wallet.
Holder
A role an entity might perform by possessing one or more verifiable credentials and generating presentations from them. A holder is usually, but not always, a subject of the verifiable credentials they are holding. Holders store their credentials in credential repositories.
Issuer
A role an entity can perform by asserting claims about one or more subjects, creating a verifiable credential from these claims, and transmitting the verifiable credential to a holder.
Level of Assurance (LoA)
The degree of certainty that a relying party can have about the true identity of someone presenting an identity credential. Four levels of assurance were outlined by a 2006 document from the US National Institute of Standards and Technology (NIST 800-63). The level of assurance is measured by the strength and rigor of the identity proofing process, the strength of the token used to authenticate the identity claim, and the management processes the identity provider applies to it.
List Operator
A party that manages a list of Verifiable Issuers and/or Verifiable Verifiers
Sharing
The act of transferring information from one party to another. This paper uses the word "sharing" instead of "publishing" as the latter presumes a one-way and public transfer of information. The Verifiable Issuer/Verifier lists described in this paper are made available in some form or other. They might be pushed to a party or pulled from a party and might use a public communication channel or a private one.
Trust Service Provider
An entity that is listed in either a Verifiable Issuer List or a Verifiable Verifier List or both.
Note: This term is taken from ETSI TS 119 612 V2.1.1
Verifiable Issuer / Verifiable Verifier
An entity that is verifiable. The entity might have different levels of trustworthiness associated with it by different third parties. Note that “trusted” and “authorized” are sometimes used as synonyms for “verifiable”, as the purpose of some lists is to assure trust or authority. This paper uses the word “verifiable”, as no presumption should be made about the applicability of the lists, or the trust/authority that they assure.
Verifiable Issuer/Verifier List
A container that consists of a set of Verifiable Issuers or Verifiers. The word “list” can be considered synonymous to “register”, depending on the amount of governance, assurance, and authority associated with it. This paper uses the word “list” and presumes there will always be some form of governance, if only the establishment of its purpose and the format of its entries.
Verifier
A role an entity performs by receiving one or more verifiable credentials, optionally inside a verifiable presentation, for processing. Other specifications might refer to this concept as a relying party.
This section contains criteria that can be used to determine whether something does or does not fit a particular terminological definition in the previous section.
sharing
list
parties
ListName.
Furthermore, each list entry should also be precisely described, as, for example,
"Issues Student ID cards for University X". This is represented in the data model
by the property ServiceName.
This section outlines use cases that highlight the need for the technology described in this paper by discussing the use cases in two categories:
A final use case section then checks for commonalities and differences between the two categories
There are a number of other locations that have published use cases that are related to this paper. Rather than include the content of those use cases in this document, they are included by reference:
Figure 1: A Verifiable-Issuer List helps verifying whether a diploma is genuine.
See also Verify the Verifier - Anti-coercion by Design; October 2020 | TNO
Figure 2: A properly-implemented wallet with Verifiable-Verifier List protects citizens against overzealous law enforcement.
Conceptually and technically, the two types of lists (Verifiable Issuer, Verifiable Verifier) are fairly similar. Each type is a governed list of parties with a role in SSI exchanges. Each type needs to provide some form of sharing (publication/access), so that the list is available to its users. This paper will presume that the types of lists themselves, as well as their sharing methods, can be technically identical. The only distinction is that a list could contain only Verifiable Issuers, only Verifiable Verifiers, or both, so the data model should accommodate this.
Major differences arise in the applications surrounding the lists. Verifiable Issuer lists target Verifier implementations, whereas Verifiable Verifier lists target Holder (digital wallet) implementations. Also there may be major differences in the governance between the two types of lists, or whether/how the consulting of lists is implemented and enforced. All of these differences are out of the scope of this paper.
An Assurance Community is what governs a list of Verifiable Issuers and/or Verifiers. The community can consist of a single person, a group of people, an organization, a group of organizations, or any other relevant structure. The governing can be purely manual, partially automated, or completely automated through the use of APIs or smart contracts.
A list of Verifiable Issuers and/or Verifiable Verifiers contains entries with information about the Issuers and/or Verifiers that it verifies.This information can be as minimal as a single DID or public key per Verifiable Issuer or Verifiable Verifier, or it can also include metadata about each entity and the services that each entity performs.
An Interested Party is an entity that uses one or more entries from the List of Verifiable Issuers and/or Verifiable Verifiers in a decision making process. An interested party is typically software that is acting on behalf of an Issuer, Holder, or Verifier. The party might request the entire List, or portions of the List over either a public channel, or a private channel.
The following requirements have been specified by the authors. It includes both requirements on a Verifiable-Issuers/Verifiers List (“a list” in short) as a whole and its individual entries. These requirements may be updated in the future.
The only technology approach that we were not able to analyze deeply is Trinsic's approach. We need to make sure their approach is integrated into and aligned with the documented use cases, requirements, and the rest of the document.
The Working Group thanks the following individuals for significant contributions to the community: TBD
Work on this specification has been supported by the Rebooting the Web of Trust community facilitated by Christopher Allen, Joe Andrieu, and Erica Connell. The participants in the Internet Identity Workshop, facilitated by Phil Windley, Kaliya Young, Doc Searls, and Heidi Nobantu Saul, also supported the refinement of this work through numerous working sessions designed to educate about, debate on, and improve this specification.
The Working Group would like to thank the following individuals for reviewing and providing feedback on the specification (in alphabetical order):
Some of the imagery in this specification was provided by Ron Lach and Kindel Media under the Pexel's license. We are thankful to those individuals and Pexels for providing imagery that this community could use and have made donations to each of those contributors.