Formats
how different digital credential formats relate to one another
Last updated
how different digital credential formats relate to one another
Last updated
Cryptography can be used to create digital versions of credentials. X509 certificates are a familiar example of first-generation digital credentials.
About a decade ago, work began on a second generation of digital credentials that solves some centralization and maintenance problems. This technology is called verifiable credentials, and is associated with , the , and the . Origin can help support these technologies. However, the focus of Origin is a third generation of digital credentials called .
ACDCs have a richer and more flexible data model than simple VCs. They are more efficient with storage and network, and they are significantly more secure. They support more sophisticated signing, delegation, and revocation patterns. They are post-quantum ready. And they can also be used to create or cite verifiable data chains that are not intended to grant privileges (e.g., provably sourced scientific data or journalism, scholarly citations, financial or legal evidence). Although we might still casually refer to ACDCs as "credentials", ACDCs use cases are much broader.
Because ACDCs are not always issued to an individual human owner who wants privileges, we prefer the generic term issuee rather than holder to describe the party that receives them.