Skip to content

Introduction is misleading #482

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
nadalin opened this issue Mar 27, 2019 · 8 comments
Closed

Introduction is misleading #482

nadalin opened this issue Mar 27, 2019 · 8 comments
Milestone

Comments

@nadalin
Copy link

nadalin commented Mar 27, 2019

The introduction is misleading as this talks about signing .. "he addition of technologies, such as digital signatures, makes verifiable credentials more tamper-evident and more trustworthy than their physical counterparts." this specification does not implement signatures.

@brentzundel
Copy link
Member

I believe this data model document does not specify which signatures must be used with verifiable credentials because the choice of signature type depends on the protocol within which verifiable credentials will be used.
Per the working group charter, this group may not specify protocol.
This does not mean that a place for signatures (the proof property) cannot be specified in the data model. The specification does not implement signatures, but it does specify where signatures may be used.

@burnburn burnburn added this to the CR-Exit milestone Mar 27, 2019
@nadalin
Copy link
Author

nadalin commented Mar 28, 2019

it does unless you have a signature that actually works with the data model chosen, a solution exists for JWT as there are JWS/E/K specifications.

@brentzundel
Copy link
Member

Is it your contention that unless a signature scheme is part of a published specification, that it cannot be considered as a means of verifying a credential?

@nadalin
Copy link
Author

nadalin commented Mar 28, 2019

I'm not set on a signature as a proof mechanism so I would say unless there is a agreed upon proof mechanism, which there is not today, in the case of a JWT/CWT a JWS or JWE could be used as a proof.

@brentzundel
Copy link
Member

I agree that in the case of JWT/CWT, a JWS or JWE could certainly be used as a proof.
To my understanding, there is nothing in the data model that prohibits this.

@msporny
Copy link
Member

msporny commented Mar 30, 2019

The introduction is misleading as this talks about signing

The editors are having a hard time translating this into a concrete specification text change. Could you please provide some concrete text change that would address the issue you raised so that the WG has something concrete to discuss?

@stonematt
Copy link
Contributor

WG resolution: https://www.w3.org/2019/04/02-vcwg-minutes.html#resolution04
RESOLUTION: Add more clarifying text to the specification noting that while the specification does not standardize on signature format, the WG is aware of at least three mechanisms (JWTs, LD-Proofs, and ZKPs) that are capable of protecting the contents of the data model at the time of publication that are being used in deployments of the technology and expects those mechanisms to mature independently as well as new mechanisms to become standardized.

@msporny
Copy link
Member

msporny commented Apr 13, 2019

Clarifying text has been merged in PR #531 to address the issue raised by @nadalin. The resolution from the WG has been applied. More than 7 days has passed since the resolution passed. Closing the issue per the WG's approved CR issue processing procedure.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants