Verifiable Credentials Explained
All Verifiable Credentials have in common that they are based on a self-sovereign information sharing pattern where the Holders (subjects) of credentials are in control of how, when, and by whom their information is verified, via an EBSI Conformant wallet. This all is done by implementing the W3C's Verifiable Credentials standard, to ensure wide adoption and compatibility. Below you will find a series of publications that will walk you through the technologies that make it possible for Public Administrations and Businesses to easily verify and trust information received directly from Citizens (or Businesses).
Or do you want to explore more?
Explore our Success Stories overview and check the demos.
Explore the specifications in details by consulting the VC Playbook.