Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Presentation Definition

A machine-readable specification from a verifier that outlines the required credentials, claims, and constraints for a Verifiable Presentation.
Chainscore © 2026
definition
VERIFIABLE CREDENTIALS

What is a Presentation Definition?

A Presentation Definition is a machine-readable specification that defines the exact requirements a verifier has for data presented by a holder in a verifiable credential exchange.

A Presentation Definition is a standardized data structure, defined by the Decentralized Identity Foundation (DIF), that specifies the verifiable credentials a verifier requires from a holder. It acts as a formal request, detailing the types of credentials, the specific claims within them, and the cryptographic proofs needed. This definition is typically expressed in JSON or JSON-LD and is the cornerstone of the W3C Verifiable Credentials Data Model and protocols like OpenID for Verifiable Presentations (OID4VP) and Presentation Exchange.

The core components of a Presentation Definition include input descriptors, which define the required credential schema (e.g., a driver's license), and constraints, which specify the exact claims (e.g., dateOfBirth) and potentially the issuers trusted by the verifier. It may also require specific proof types, such as a JSON Web Signature (JWS) or Data Integrity Proof, to ensure the credential's authenticity and integrity. This allows a verifier to request, for example, "a government-issued ID from a trusted issuer proving the holder is over 21" in an unambiguous, machine-processable format.

In the credential exchange flow, the verifier sends the Presentation Definition to the holder's wallet. The wallet software then evaluates its stored credentials to find a match that satisfies all constraints. If a match is found, the wallet constructs a Verifiable Presentation—a wrapper containing the selected credentials and proofs—which is then submitted back to the verifier. This process enables selective, privacy-preserving disclosure, as the holder only shares the minimum necessary data required by the definition.

Presentation Definitions are fundamental to implementing zero-knowledge proofs and data minimization principles in digital identity. For instance, a definition can be crafted to require a cryptographic proof of age (e.g., over 18) without revealing the exact birth date. By standardizing the request format, they ensure interoperability between different wallet and verifier implementations, forming the technical basis for trusted data exchanges across web2 and web3 ecosystems, from KYC checks to decentralized access control.

how-it-works
VERIFIABLE CREDENTIALS

How a Presentation Definition Works

A Presentation Definition is a machine-readable specification that defines the exact requirements a verifier has for a credential presentation, enabling selective disclosure and interoperability.

A Presentation Definition is a structured data object, typically formatted in JSON, that specifies the verifiable credentials a verifier requires from a holder. It acts as a formal request, detailing the specific credential types, the claims (or attributes) needed from them, and the cryptographic proofs required for verification. This definition is governed by standards like the W3C Verifiable Credentials Data Model and the Decentralized Identity Foundation's Presentation Exchange specification, ensuring systems from different issuers can interoperate.

The core function of a Presentation Definition is to enable selective disclosure. Instead of presenting an entire credential, a holder can use cryptographic techniques like BBS+ signatures or zero-knowledge proofs to prove they possess credentials that satisfy the definition's constraints without revealing extraneous information. The definition can mandate specific credential schemas, require certain issuer DIDs, and set policies for credential status (e.g., not revoked). This allows for privacy-preserving, minimal-data exchanges.

In a typical flow, a verifier sends its Presentation Definition to a holder's wallet. The wallet software evaluates the holder's stored credentials to find a match. If suitable credentials exist, the wallet constructs a Verifiable Presentation—a wrapper containing the disclosed proofs—that conforms to the definition's rules. This presentation is then returned to the verifier for validation. This mechanism is fundamental to user-centric identity, giving individuals control over what personal data they share in any given transaction.

key-features
W3C VERIFIABLE CREDENTIALS

Key Features of a Presentation Definition

A Presentation Definition is a machine-readable specification that defines the exact set of Verifiable Credentials a Verifier requires from a Holder. It is the cornerstone of the credential exchange process.

01

Credential Query Format

A Presentation Definition uses a structured format, often JSON, to specify the required Verifiable Credentials. It defines the query using Input Descriptors, which specify the type of credential, the issuer, and the specific claims (e.g., birth_date, degree_type) that must be presented. This allows Verifiers to request credentials without knowing the Holder's identity beforehand.

02

Input Descriptors

These are the core building blocks within a Presentation Definition. Each Input Descriptor defines a single required credential or set of claims. Key components include:

  • id: A unique identifier for the descriptor.
  • constraints: Rules specifying acceptable credential schemas, trusted issuers, and required subject fields.
  • purpose: A human-readable explanation of why the credential is being requested.
03

Submission Requirements

This section dictates how the Holder must structure their response, known as a Presentation Submission. It defines:

  • The format (e.g., JWT, JSON-LD) for the presented credentials.
  • Whether a Holder's binding (cryptographic proof of control) is required.
  • The mapping of submitted credentials to the requested Input Descriptors, ensuring the Verifier can correctly process the response.
04

Format and Schema Constraints

To ensure interoperability, a Presentation Definition can specify the exact technical formats and data schemas it accepts. This includes:

  • Credential Format: Mandating jwt_vc_json or ldp_vc.
  • JSON Schema: Requiring the credential data to conform to a specific JSON Schema for validation.
  • Issuer DID: Restricting credentials to those issued by a Decentralized Identifier (DID) from a trusted list.
05

Holder Binding Requirements

This feature ensures the presenter of the credentials is their legitimate Holder. The definition can require a Holder Binding, which is a cryptographic proof (like a signature) linking the Presentation Submission to a specific Decentralized Identifier (DID) controlled by the Holder. This prevents credential replay attacks and establishes a verifiable session.

standardization
VERIFIABLE CREDENTIALS

Presentation Definition

A Presentation Definition is a machine-readable specification that defines the exact requirements a verifier has for the Verifiable Credentials it will accept.

In the Verifiable Credentials (VC) data model, a Presentation Definition is a standardized format, often expressed in JSON, that a verifier (the entity requesting proof) sends to a holder (the entity presenting credentials). It specifies the precise set of credentials, claims, and constraints required for a successful verification. This includes the types of credentials (e.g., a driver's license), the specific claims needed from within them (e.g., dateOfBirth), and any additional proof requirements like cryptographic signatures or Zero-Knowledge Proof (ZKP) predicates. This machine-readable format enables automated, interoperable exchanges between different software systems.

The structure of a Presentation Definition is governed by the Presentation Exchange (PE) specification, which provides a common language for credential negotiation. Key components include input_descriptors, which define each required credential, and constraint objects that detail the allowed issuers, schema types, and field-level rules (e.g., "minimum": 21 for an age check). This allows a verifier to request complex, conditional logic—such as "Proof of age over 21 or a government-issued membership credential"—without needing to understand the holder's specific credential format in advance.

For the holder, a Wallet or agent application processes the Presentation Definition to determine if it can be satisfied with the credentials in its possession. The holder then constructs a Verifiable Presentation—a packaged response containing the requested credentials and proofs—that conforms to the definition's rules. This decoupled request-response pattern is fundamental to preserving user-centric identity and selective disclosure, as the holder maintains control over their credentials and only shares what is explicitly required.

common-constraints
PRESENTATION DEFINITION

Common Constraints & Descriptors

A Presentation Definition is a machine-readable specification that defines the exact requirements a Verifier has for the Verifiable Credentials it will accept from a Holder. It is a core component of the W3C Verifiable Credentials Data Model.

01

Format Constraints

Specifies the required data format(s) for the Verifiable Credential. Common formats include:

  • JWT (JSON Web Token): A compact, URL-safe token format.
  • JSON-LD (Linked Data): A format that supports semantic linking and proof graphs.
  • SD-JWT (Selective Disclosure JWT): Enables selective disclosure of claims within a JWT. The definition can list multiple acceptable formats, allowing for interoperability.
02

Credential Schema

References the JSON Schema or similar schema definition that the submitted credential's data must conform to. This ensures structural and semantic validity by defining:

  • Required claims (data fields) and their data types.
  • Any constraints on values (e.g., string patterns, numerical ranges).
  • The schema URI acts as a unique identifier for the expected data structure.
03

Input Descriptors

The core building blocks that define what data is required. Each Input Descriptor includes:

  • An id for unique reference.
  • A human-readable name and purpose.
  • Constraints that specify the allowed credential types, trusted issuers, and required fields.
  • Fields that map to specific claims within the credential, optionally with filtering rules.
04

Submission Requirements

Defines the logical rules for how multiple Input Descriptors must be satisfied. It specifies the submission structure, such as:

  • pick: The Holder must submit credentials matching a specified number of descriptors from a list.
  • all: The Holder must submit credentials satisfying all listed descriptors. This allows for complex policies like "Provide a passport OR (a driver's license AND a utility bill)".
05

Trust Framework & Issuer Constraints

Restricts which credential issuers are considered trusted. Constraints can specify:

  • DID (Decentralized Identifier) of authorized issuers.
  • Issuance Date requirements (e.g., credential must not be expired).
  • Trust Registry lookups to dynamically verify issuer status. This is critical for ensuring the Verifier only accepts credentials from authoritative sources.
W3C VERIFIABLE CREDENTIALS

Presentation Definition vs. Input Descriptor

A comparison of the two core data structures used to request verifiable credentials in a presentation exchange.

FeaturePresentation DefinitionInput Descriptor

Primary Purpose

Defines the complete request for a Verifiable Presentation

Defines a single type of credential or claim required within a Presentation Definition

Scope

Container object for one or more Input Descriptors

A child object nested within a Presentation Definition

JSON Schema Property

presentation_definition

input_descriptors

Defines Constraints

No, delegates to Input Descriptors

Yes, via the constraints.fields array

Specifies Format Preferences

Yes, via top-level format property

No, inherits from parent Presentation Definition

Submission Requirements

Yes, via submission_requirements for complex logic (e.g., 'pick 2 of 3')

No, logic is managed at the Presentation Definition level

Directly Submitted to Verifier

Yes, the entire object is the request

No, submitted only as part of a fulfilled Presentation Definition

examples
PRESENTATION LAYER

Real-World Use Case Examples

The Presentation Layer is the user-facing interface that translates complex blockchain data into actionable insights. These examples showcase how it powers dashboards, analytics, and developer tools.

BLOCKCHAIN GLOSSARY

Frequently Asked Questions (FAQ)

Clear, concise answers to the most common questions about blockchain technology, smart contracts, and Web3 development.

A blockchain is a decentralized, distributed digital ledger that records transactions across a network of computers in a way that is secure, transparent, and tamper-resistant. It works by grouping transactions into blocks, which are then cryptographically linked (or 'chained') to the previous block using a hash. This creates an immutable historical record. Consensus mechanisms like Proof of Work (PoW) or Proof of Stake (PoS) are used by network participants (nodes) to agree on the validity of new blocks without needing a central authority. This architecture ensures data integrity and eliminates the need for trusted intermediaries.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team