Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 8 additions & 18 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -425,20 +425,12 @@ <h3>Use Cases and Requirements</h3>
<!-- requirement list start -->
<ul>
<li>
<a>Credentials</a> represent statements made by an <a>issuer</a>.
</li>
<li>
<a>Verifiable credentials</a> represent statements made by an <a>issuer</a> in
a tamper-evident and privacy-respecting manner.
</li>
<li>
<a>Holders</a> assemble collections of <a>credentials</a> and/or
<a>verifiable credentials</a> from different <a>issuers</a> into a single
artifact, a <a>presentation</a>.
</li>
<li>
Holders transform <a>presentations</a> into <a>verifiable presentations</a>
to render them tamper-evident.
<a>Holders</a> can assemble collections of <a>verifiable credentials</a> from
different <a>issuers</a> into a single artifact, a <a>verifiable presentation</a>.
</li>
<li>
<a>Issuers</a> can issue <a>verifiable credentials</a> about any <a>subject</a>.
Expand Down Expand Up @@ -510,14 +502,12 @@ <h3>Use Cases and Requirements</h3>
<a>Issuers</a> can issue revocable <a>verifiable credentials</a>.
</li>
<li>
The processes of cryptographically protecting <a>credentials</a> and
<a>presentations</a>, and verifying <a>verifiable credentials</a> and
<a>verifiable presentations</a>, have to be deterministic, bi-directional, and
lossless. Any verification of a <a>verifiable credential</a> or
<a>verifiable presentation</a> has to be transformable to the generic data model
defined in this document in a deterministic process, such that the resulting
<a>credential</a> or <a>presentation</a> is semantically and syntactically
equivalent to the original construct, so that it can be processed in an
The processes of cryptographically protecting and verifying
<a>verifiable credentials</a> and <a>verifiable presentations</a> have to be
deterministic, bi-directional, and lossless. Any
<a>verifiable credential</a> or <a>verifiable presentation</a> has to be
transformable to the JSON-LD data model defined in this document via a
deterministic process so that its verification can be processed in an
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@brentzundel I am still struggling with this part. I know you didn't create this text, you are just trying to clean it up.... but the whole paragraph is problematic.

Many digital signatures are not deterministic, some datetime conversions are always lossy....

DataIntegrityProofs can be lossy ( order issues, context integrity issues, etc...)... Even assuming this paragraph was meant to only apply to data integrity proofs, I am not sure it is accurate.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think there a numerous problems with the whole use cases section, which is non-normative but feels very official. I've opened #1169 to have a conversation about removing it.

interoperable fashion.
</li>
<li>
Expand Down