Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Verifiable Presentation (VP)

A Verifiable Presentation (VP) is a tamper-evident, signed container that packages one or more Verifiable Credentials for presentation to a verifier.
Chainscore © 2026
definition
DECENTRALIZED IDENTITY

What is Verifiable Presentation (VP)?

A Verifiable Presentation (VP) is a cryptographically secure package of one or more Verifiable Credentials, presented by a holder to a verifier to prove specific claims about themselves.

A Verifiable Presentation (VP) is a data format, defined by the W3C Verifiable Credentials Data Model, that allows an entity (the holder) to present one or more Verifiable Credentials (VCs) to another party (the verifier). The VP itself is cryptographically signed by the holder, providing proof of the presentation act and allowing the verifier to cryptographically verify both the authenticity of the presented credentials and the fact that they were intentionally shared by the holder. This creates a chain of trust from the original issuer through to the final presentation.

The structure of a VP is flexible. It can contain the full credential data, selective disclosures of specific claims from a credential, or even zero-knowledge proofs derived from credentials to enhance privacy. The core components include metadata about the presentation itself, the set of verifiable credentials being presented, and a proof property containing the holder's digital signature. This design enables user-centric data control, as the holder decides what to share, with whom, and for what purpose, without relying on the credential issuer to be online.

Verifiable Presentations are fundamental to Decentralized Identity (DID) and Self-Sovereign Identity (SSI) ecosystems. Common use cases include age verification without revealing a full birthdate, proving professional qualifications to a potential employer, or accessing a service by demonstrating membership. By using VPs, interactions shift from centralized account-based authentication to a model of portable, user-controlled attestations, reducing data silos and improving privacy and interoperability across different platforms and organizations.

key-features
VERIFIABLE PRESENTATION

Key Features

A Verifiable Presentation (VP) is a cryptographically signed wrapper for one or more Verifiable Credentials, enabling selective disclosure and proof of ownership.

01

Cryptographic Proof of Ownership

A VP is digitally signed by the holder, providing cryptographic proof that they are the legitimate owner of the contained credentials. This prevents credentials from being presented by unauthorized parties and establishes a clear chain of custody from issuer to holder to verifier.

02

Selective Disclosure

Holders can create presentations that reveal only specific claims from their credentials, rather than the entire document. For example, a VP could prove you are over 21 from a driver's license credential without revealing your birth date, address, or license number. This is a core privacy-enhancing feature.

03

Aggregation of Multiple Credentials

A single Verifiable Presentation can bundle credentials from different issuers to satisfy complex verification requirements. For instance, a job application VP could combine a university degree credential, a professional certification credential, and a proof-of-employment credential into one verifiable package.

04

Standardized Data Format

VPs are typically serialized in standardized formats like JSON Web Tokens (JWT) or JSON-LD with Linked Data Proofs, as defined by the W3C Verifiable Credentials Data Model. This ensures interoperability across different systems, issuers, and verifiers.

05

Presentation Request & Response Flow

The process is typically initiated by a verifier sending a Presentation Request (specifying required credentials and proofs). The holder's wallet then constructs a compliant VP in response. This structured flow enables automated, machine-readable trust interactions.

06

Non-Transferability & Anti-Fraud

Because the VP is bound to the holder's Decentralized Identifier (DID) and signed with their private key, it cannot be copied and used by someone else. This provides strong protection against credential forgery and replay attacks compared to physical or simple digital documents.

how-it-works
DECENTRALIZED IDENTITY

How a Verifiable Presentation Works

A Verifiable Presentation (VP) is a fundamental data structure in decentralized identity systems that allows a holder to selectively present claims to a verifier in a privacy-preserving and cryptographically secure manner.

A Verifiable Presentation is a wrapper, typically a JSON-LD or JWT object, that packages one or more Verifiable Credentials (VCs) for presentation to a relying party, known as the verifier. Its core function is to prove control over the credentials without revealing unnecessary information. The presentation itself is signed by the holder (the entity presenting the credentials), providing cryptographic proof that they consented to share the data at that specific time. This creates a clear, auditable chain from the original issuer to the final presentation.

The workflow involves three key actors: the issuer who signs the original credentials, the holder who stores and controls them, and the verifier who requests and validates the presentation. When a verifier requests proof (e.g., "prove you are over 21"), the holder's wallet constructs a VP. This can include the full VC, a zero-knowledge proof derived from the VC, or a selective disclosure of specific attributes. The holder then signs this entire package with their private key, binding the presentation to that specific interaction.

Cryptographic verification is the final and critical step. The verifier checks multiple signatures: the issuer's signature on each embedded VC to ensure its authenticity and integrity, and the holder's signature on the VP to confirm the presentation is fresh and authorized. This dual-layer verification ensures credentials have not been tampered with and are being presented by their legitimate owner. Standards like the W3C Verifiable Credentials Data Model define the structure, while Decentralized Identifiers (DIDs) often provide the cryptographic underpinnings for the signatures.

Advanced privacy features are a hallmark of VP architecture. Techniques like derived predicates allow a holder to prove a statement about a credential (e.g., "age > 21") without revealing the exact birth date. Presentation exchange protocols, such as those defined by the Decentralized Identity Foundation (DIF), standardize how verifiers request presentations and holders respond, enabling interoperability across different wallets and verifier systems without centralized coordination.

In practice, a Verifiable Presentation enables use cases requiring trusted, user-centric data sharing. For example, applying for a loan might involve a VP containing a VC from a government issuer (proving identity), a VC from an employer (proving income), and a VP-signed proof of credit score from a bureau—all shared directly by the user without intermediary data brokers. This shifts the paradigm from countless insecure copies of personal data to cryptographically verifiable presentations shared under the user's direct control.

examples
VERIFIABLE PRESENTATION

Real-World Use Cases

A Verifiable Presentation (VP) is a cryptographically signed package of one or more Verifiable Credentials, presented by a holder to a verifier to prove specific claims. These are the practical applications where VPs enable trust and privacy.

01

Decentralized Identity & KYC

Users can present a Verifiable Credential from a trusted issuer (e.g., a government or bank) to prove their identity without revealing their full personal data. This streamlines Know Your Customer (KYC) processes for DeFi, exchanges, and enterprise access.

  • Example: A user presents a VP containing a government-issued ID credential to access a high-limit trading platform, proving they are over 18 and a resident without exposing their address or full ID number.
02

Selective Disclosure for Privacy

A core feature of VPs is the ability to prove specific claims from a credential without showing the entire document. This is achieved through zero-knowledge proofs (ZKPs) or BBS+ signatures.

  • Example: Proving you are over 21 from a driver's license credential, without revealing your name, address, or exact birth date. This protects user PII (Personally Identifiable Information) while meeting verification requirements.
03

Portable Academic & Professional Credentials

Universities and certification bodies can issue digital diplomas and certificates as Verifiable Credentials. Graduates can then create VPs to present these credentials to employers, other institutions, or licensing boards.

  • Example: A job applicant presents a VP containing their verified university degree and professional certifications directly from the issuing institutions, eliminating manual transcript requests and fraud.
04

Secure Access & Authentication

VPs can replace traditional passwords and OAuth tokens for logging into websites, physical facilities, or IoT devices. The user presents a VP proving membership, employment status, or subscription level.

  • Example: Gaining access to a corporate building by presenting a VP from the company's HR system proving current employment. The access system (verifier) checks the digital signature and credential status without contacting a central database.
05

Supply Chain Provenance

In supply chains, VPs can bundle credentials from multiple sources to prove the origin, ethical sourcing, and handling of a product. Each entity in the chain issues credentials about their part, which are aggregated into a final VP.

  • Example: A coffee brand presents a VP to a retailer containing credentials from the farm (organic certification), shipper (temperature logs), and processor (fair-trade audit) to verify the product's full journey.
06

Healthcare Data Sharing

Patients can control and share their medical records by creating VPs from credentials issued by hospitals, labs, and insurers. They share only the data relevant to a specific consultation or insurance claim.

  • Example: A patient creates a VP for a specialist that includes only their recent lab results and vaccination history from different providers, maintaining the privacy of their full medical history.
COMPARISON

Verifiable Presentation vs. Verifiable Credential

A breakdown of the core components in the W3C Verifiable Credentials Data Model.

FeatureVerifiable Credential (VC)Verifiable Presentation (VP)

Core Definition

A tamper-evident credential with cryptographic authorship, issued to a holder.

A wrapper for presenting one or more VCs, with its own cryptographic signature.

Primary Function

To make a specific, verifiable claim (e.g., name, degree, license).

To selectively disclose credentials to a verifier for a specific purpose.

Issuer

An authoritative entity (e.g., university, government).

The holder of the credential(s).

Signer

The issuer.

The holder (presents a VP signed by them).

Data Structure

Contains claims, issuer metadata, proof, and status information.

Contains the presented VC(s), a proof, and optional holder/verifier metadata.

Verification Check

Credential integrity, issuer signature, revocation status.

VP integrity, holder's signature, and the validity of all contained VCs.

Example

A digital driver's license issued by the DMV.

Presenting that driver's license, along with a proof of age, to a bartender.

security-considerations
VERIFIABLE PRESENTATION

Security & Privacy Considerations

A Verifiable Presentation (VP) is a cryptographically verifiable data structure that packages one or more Verifiable Credentials for sharing. Its security and privacy properties are critical for user control and trust.

01

Selective Disclosure

A core privacy feature allowing a holder to reveal only specific claims from a credential without exposing the entire document. This minimizes data exposure and supports data minimization principles. For example, proving you are over 21 from a driver's license credential without revealing your exact birth date or address.

02

Presentation Proof & Nonce

The cryptographic proof in a VP binds it to a specific challenge (a nonce) provided by the verifier. This prevents replay attacks where an old presentation is reused. The proof, often a zero-knowledge proof or digital signature, cryptographically demonstrates the holder's control over the credentials and the integrity of the presented data.

03

Holder Binding & Authentication

A VP must cryptographically prove it was created by the legitimate holder of the credentials, not stolen or replayed. This is achieved through holder binding mechanisms, such as proving control of a Decentralized Identifier (DID) or a specific cryptographic key. This prevents impersonation and ensures the presenter is the legitimate subject.

04

Credential Integrity & Revocation

The VP relies on the integrity of the underlying Verifiable Credentials (VCs). Verifiers must check:

  • The VC's cryptographic signature from the issuer.
  • The VC's status against a revocation registry (e.g., a revocation list). A VP containing a revoked or tampered credential is invalid, regardless of its own proof.
05

Verifier Policy & Trust

Security depends on the verifier's policies. A verifier must define and check:

  • Trusted Issuers: Which DID or public keys are accepted?
  • Required Claims: What specific data must be presented?
  • Proof Suites: Which cryptographic proof types (e.g., BBS+ signatures, JWT) are supported? Failure to enforce policy can lead to accepting fraudulent data.
06

Privacy-Preserving Proofs

Advanced cryptographic techniques like Zero-Knowledge Proofs (ZKPs) and BBS+ signatures enable unlinkable presentations. This allows a user to prove a statement (e.g., "I am a accredited investor") without revealing the credential identifier or correlatable data across multiple presentations, protecting against tracking and profiling.

technical-details
TECHNICAL DETAILS & DATA MODEL

Verifiable Presentation (VP)

A Verifiable Presentation (VP) is a fundamental data structure in decentralized identity systems that allows a holder to present one or more Verifiable Credentials in a tamper-evident and privacy-preserving manner.

A Verifiable Presentation (VP) is a cryptographically signed wrapper, typically formatted as a JSON Web Token (JWT) or a JSON-LD Linked Data Proof, that packages one or more Verifiable Credentials (VCs) for submission to a verifier. Its primary function is to prove control over the credentials and to selectively disclose information from them. The presentation itself is signed by the credential holder, not the original issuer, which allows the holder to prove possession and consent to share the data. This mechanism ensures the integrity and authenticity of the presented claims while allowing for selective disclosure and data minimization.

The core components of a VP's data model include the @context, type (which is VerifiablePresentation), the verifiableCredential array containing the actual credentials, and a proof section with the holder's digital signature. Advanced presentations may also include a holder field identifying the presenter and a challenge or domain to prevent replay attacks. Unlike a VC, which is issued and signed once, a VP is created dynamically by the holder for each specific interaction, enabling context-specific proofs—such as proving one is over 21 without revealing their exact birthdate.

From a technical perspective, creating a VP involves the holder's wallet or agent retrieving the relevant VCs from storage, potentially applying zero-knowledge proofs or BBS+ signatures for selective disclosure, and then signing the entire presentation package. The verifier receives the VP, checks the holder's signature on the presentation, and then validates the signatures and status of each embedded VC. This two-layer verification—of the presentation's freshness and the credentials' validity—is crucial for trust in interactions across decentralized ecosystems like SSI (Self-Sovereign Identity) and DID (Decentralized Identifier) frameworks.

ecosystem-usage
VERIFIABLE PRESENTATION

Ecosystem & Protocol Usage

A Verifiable Presentation (VP) is a cryptographically signed wrapper for one or more Verifiable Credentials, enabling selective disclosure and proof of identity claims. It is a core component of decentralized identity (DID) ecosystems.

01

Core Definition & Structure

A Verifiable Presentation is a data format that packages one or more Verifiable Credentials (VCs) along with proof that the presenter is the legitimate holder. It is cryptographically signed, typically using the presenter's Decentralized Identifier (DID).

  • Purpose: To present claims from credentials to a Verifier without revealing the underlying credential's full data.
  • Key Components: The VP includes the VCs, a proof of presentation (signature), and metadata about the presenter and verifier.
02

Selective Disclosure

This is a primary function of a VP, allowing users to prove specific claims from a credential without exposing the entire document.

  • Example: A user can present proof they are over 21 from a government-issued ID VC, without revealing their name, address, or exact birth date.
  • Methods: Achieved through zero-knowledge proofs (ZKPs), BBS+ signatures, or hash-based derivations to create a Verifiable Presentation containing only the necessary, verifiable predicates.
03

Role in the Trust Triangle

The VP is the final step in the decentralized identity interaction model between three parties:

  • Issuer: Creates and signs the original Verifiable Credential.
  • Holder: Stores the VC and creates a Verifiable Presentation for the Verifier.
  • Verifier (Relying Party): Receives the VP, verifies its cryptographic signatures (from both Holder and Issuer), and accepts the contained claims.

The VP enables trust to flow from the Issuer to the Verifier via the Holder.

05

Use Case: Decentralized Finance (DeFi)

In DeFi, VPs enable on-chain verification of off-chain identity or creditworthiness.

  • Sybil Resistance: Protocols can require a VP proving a unique human identity (via a VC) to prevent bot attacks on airdrops or governance.
  • Credit Scoring: A user can present a VP containing a credit score VC from a trusted issuer to access undercollateralized loans.
  • Regulatory Compliance (KYC): A VP can prove KYC status from a licensed entity without exposing personal data to the smart contract.
06

Use Case: Access Control & Authentication

VPs are replacing traditional passwords and OAuth tokens for logging into websites and physical facilities.

  • Passwordless Login: A user presents a VP (e.g., from a digital wallet) to a website, which verifies it against a DID listed in its access control list.
  • Physical Access: A VP stored on a mobile device can be presented via QR code to gain entry to a building, proving employment status or membership.
  • Selective Attribute Release: A user grants a service access only to their verified email address via a VP, not their full social profile.
VERIFIABLE PRESENTATION

Common Misconceptions

Verifiable Presentations (VPs) are a core component of decentralized identity, but their purpose and mechanics are often misunderstood. This section clarifies the most frequent points of confusion.

No, a Verifiable Presentation is not the same as a Verifiable Credential (VC). A Verifiable Credential is a tamper-evident, cryptographically signed assertion issued by an issuer (e.g., a university granting a diploma). A Verifiable Presentation is a package created by a holder (the user) that contains or references one or more VCs, along with proofs, and is presented to a verifier (e.g., a job application portal). The VP is a wrapper that proves the holder controls the credentials without necessarily revealing all the data within them, enabling selective disclosure.

VERIFIABLE PRESENTATION

Frequently Asked Questions (FAQ)

A Verifiable Presentation (VP) is a fundamental data structure in decentralized identity, allowing users to selectively share claims. These FAQs address its core mechanics, security, and practical applications.

A Verifiable Presentation (VP) is a cryptographically verifiable data format that packages one or more Verifiable Credentials (VCs) for presentation to a Verifier. It is a wrapper, typically a JSON object, that contains the credentials, metadata, and a proof (like a digital signature) demonstrating that the holder is authorized to present them. The VP itself does not contain the credential data directly but references it, allowing for selective disclosure where the holder can choose which specific claims from a credential to reveal. This structure is defined by the W3C Verifiable Credentials Data Model and is essential for privacy-preserving, user-centric identity exchanges.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Verifiable Presentation (VP) - Decentralized Identity Glossary | ChainScore Glossary