-
Notifications
You must be signed in to change notification settings - Fork 31
Open
Description
I did not see this mentioned in the "Alternatives considered section", so I figured I'd propose it here:
An alternative mechanism for achieving the use case of "proving control over an email address" could be:
- An email provider website (the "issuer") publishes a DID (using the DID
webmethod) at the email domain. - The issuer issues an Email VC with a BBS "base" proof to the user that includes their email address, e.g., using the DC-API.
- The verifier (relying party) asks for an Email VC from the user with a BBS "derived" proof, e.g., using the DC-API.
- The user provides the Email VC with an unlinkable BBS "derived" proof.
- The verifier retrieves the issuer's DID document (including the key used to verify the BBS "derived" proof) and verifies the proof.
EDIT: A side note: VCs can often serve more than one use case and the unlinkable feature of a BBS proof might be of more use there. Other types of digital signatures are of course possible. A VC used here could potentially also be used in these others ways (but not limited to just these):
- Proof of control of an account at a provider (without revealing more).
- Proof of a shared email address (perhaps a business use case) without revealing the specific individual.
- Proof of an email address at a particular domain without revealing the specific email address.
BigBlueHat
Metadata
Metadata
Assignees
Labels
No labels