From e23b24ad2664e75ffe67fb7123da79e4b06585e0 Mon Sep 17 00:00:00 2001 From: Mirko Mollik Date: Tue, 12 Sep 2023 09:22:04 +0200 Subject: [PATCH] AnonCreds method registry and issuer key management Fixes #66 Signed-off-by: Mirko Mollik --- data/Credential-Profile/AnonCreds-cardano.json | 11 +++++++++++ data/Credential-Profile/AnonCreds-cheqd.json | 11 +++++++++++ data/Credential-Profile/AnonCreds-indy.json | 13 +++++++++++++ data/Credential-Profile/AnonCreds-web.json | 12 ++++++++++++ data/Key-Management/did.cheqd.json | 7 +++++++ viewer/src/schemas/Credential-Profile.json | 2 ++ 6 files changed, 56 insertions(+) create mode 100644 data/Credential-Profile/AnonCreds-cardano.json create mode 100644 data/Credential-Profile/AnonCreds-cheqd.json create mode 100644 data/Credential-Profile/AnonCreds-indy.json create mode 100644 data/Credential-Profile/AnonCreds-web.json create mode 100644 data/Key-Management/did.cheqd.json diff --git a/data/Credential-Profile/AnonCreds-cardano.json b/data/Credential-Profile/AnonCreds-cardano.json new file mode 100644 index 0000000..68e954f --- /dev/null +++ b/data/Credential-Profile/AnonCreds-cardano.json @@ -0,0 +1,11 @@ +{ + "$schema": "../../viewer/src/schemas/Credential-Profile.json", + "Credential Profile is commonly called": "AnonCreds with cardano blockchain", + "Credential Profile Description": "AnonCreds with cardano blockchain", + "Credential Format": "AnonCred", + "Signing Algorithm": "CL", + "Key Management (Issuer)": "did:web", + "Key Management (Holder)": "link secrets", + "Trust Management": "Verifier knows Issuers", + "Formal Specification": "https://github.com/roots-id/cardano-anoncreds/blob/main/cardano-anoncred-methods.md" +} diff --git a/data/Credential-Profile/AnonCreds-cheqd.json b/data/Credential-Profile/AnonCreds-cheqd.json new file mode 100644 index 0000000..b43db07 --- /dev/null +++ b/data/Credential-Profile/AnonCreds-cheqd.json @@ -0,0 +1,11 @@ +{ + "$schema": "../../viewer/src/schemas/Credential-Profile.json", + "Credential Profile is commonly called": "AnonCreds with did:cheqd", + "Credential Profile Description": "AnonCreds with did:cheqd", + "Credential Format": "AnonCred", + "Signing Algorithm": "CL", + "Revocation Algorithm": "Indy Revocation", + "Key Management (Issuer)": "did:cheqd", + "Key Management (Holder)": "link secrets", + "Formal Specification": "https://docs.cheqd.io/identity/advanced/anoncreds" +} diff --git a/data/Credential-Profile/AnonCreds-indy.json b/data/Credential-Profile/AnonCreds-indy.json new file mode 100644 index 0000000..25b58ab --- /dev/null +++ b/data/Credential-Profile/AnonCreds-indy.json @@ -0,0 +1,13 @@ +{ + "$schema": "../../viewer/src/schemas/Credential-Profile.json", + "Credential Profile is commonly called": "AnonCreds with did:indy", + "Credential Profile Description": "Well-known default profile in all Hyperledger Indy implementations. A favoured profile due to selective disclosure and predicate capability as well as privacy-preserving revocation mechanism. Standardization in community spec in progress (July 2022).", + "Credential Format": "AnonCred", + "Signing Algorithm": "CL", + "Revocation Algorithm": "Indy Revocation", + "Key Management (Issuer)": "did:indy", + "Key Management (Holder)": "link secrets", + "Trust Management": "Verifier knows Issuers", + "Formal Specification": "https://hyperledger.github.io/anoncreds-spec/", + "Implementations": "Hyperledger Indy + Aries, Esatus, iGrant Data Wallet, British Columbia CANDY profile https://github.com/ICCS-ISAC/Candy" +} diff --git a/data/Credential-Profile/AnonCreds-web.json b/data/Credential-Profile/AnonCreds-web.json new file mode 100644 index 0000000..2c9843b --- /dev/null +++ b/data/Credential-Profile/AnonCreds-web.json @@ -0,0 +1,12 @@ +{ + "$schema": "../../viewer/src/schemas/Credential-Profile.json", + "Credential Profile is commonly called": "AnonCreds with did:web", + "Credential Profile Description": "AnonCreds with did:web", + "Credential Format": "AnonCred", + "Signing Algorithm": "CL", + "Revocation Algorithm": "Indy Revocation", + "Key Management (Issuer)": "did:web", + "Key Management (Holder)": "link secrets", + "Trust Management": "Verifier knows Issuers", + "Formal Specification": "https://github.com/2060-io/did-web-anoncreds-method" +} diff --git a/data/Key-Management/did.cheqd.json b/data/Key-Management/did.cheqd.json new file mode 100644 index 0000000..a2ddec4 --- /dev/null +++ b/data/Key-Management/did.cheqd.json @@ -0,0 +1,7 @@ +{ + "$schema": "../../viewer/src/schemas/Key-Management.json", + "Key Management": "did:cheqd", + "Specification": "https://docs.cheqd.io/identity/architecture/adr-list/adr-001-cheqd-did-method", + "Implementation Support (e.g. Libraries) / Active Community": "https://docs.cheqd.io/identity/sdk/understanding-sdks", + "Party": ["issuer"] +} diff --git a/viewer/src/schemas/Credential-Profile.json b/viewer/src/schemas/Credential-Profile.json index af5379f..ba33893 100644 --- a/viewer/src/schemas/Credential-Profile.json +++ b/viewer/src/schemas/Credential-Profile.json @@ -79,6 +79,7 @@ ".well-known/jwt-issuer", "cose key", "credential as secret", + "did:cheqd", "did:ebsi", "did:indy", "did:ion (long form)", @@ -103,6 +104,7 @@ ".well-known/jwt-issuer", "cose key", "credential as secret", + "did:cheqd", "did:ebsi", "did:indy", "did:ion (long form)",