Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Derived Credential

A Derived Credential is a new verifiable credential created from an existing one, often containing a subset of claims or transformed data, while preserving cryptographic provenance.
Chainscore © 2026
definition
DECENTRALIZED IDENTITY

What is a Derived Credential?

A derived credential is a cryptographically verifiable digital attestation that is issued based on the verification of a primary, authoritative credential, creating a privacy-preserving chain of trust.

In decentralized identity systems like W3C Verifiable Credentials, a derived credential is a new, limited-scope credential generated from a verified source credential. The issuer of the derived credential—often a different entity than the issuer of the primary credential—performs cryptographic operations to create a new attestation. This process allows specific claims from the original credential (e.g., "is over 21") to be presented without revealing the entire document or its unique identifier, enhancing user privacy through selective disclosure and minimizing data exposure.

The technical mechanism relies on zero-knowledge proofs (ZKPs) or BBS+ signatures, which enable the holder to prove predicates about the original data without revealing the data itself. For example, from a government-issued digital driver's license (the primary credential), a derived credential could be created asserting only the holder's age is over 18 for accessing a service. This derived credential is independently verifiable, cryptographically linked back to the issuer of the primary credential, establishing a verifiable chain of attestation without unnecessary data transfer.

Key use cases for derived credentials include age verification, proof of employment for specific roles, and access tokens for physical or digital premises. They solve critical problems in digital identity: reducing the attack surface by limiting shared data, preventing credential correlation across different services, and enabling portable user-centric identity. This stands in contrast to copying or presenting the full primary credential, which can lead to data over-collection and privacy violations.

From a developer's perspective, implementing derived credentials involves integrating with Decentralized Identifiers (DIDs), verifiable data registries, and specific cryptographic suites that support derivation. Frameworks like AnonCreds are built around this concept. The lifecycle involves issuance of the primary VC, a derivation request by the holder, cryptographic proof generation, and finally verification by a relying party that trusts the derivation logic and the root issuer's authority.

how-it-works
CREDENTIAL ARCHITECTURE

How Derived Credentials Work

Derived credentials are a privacy-preserving mechanism for generating new, verifiable claims from an existing source of identity or reputation, without revealing the underlying data.

A derived credential is a new, cryptographically verifiable attestation generated from an existing source credential, such as a government ID, a university degree, or an on-chain transaction history. The process uses selective disclosure and zero-knowledge proofs (ZKPs) to create a new statement—like "over 18" or "has a credit score > 700"—that is mathematically linked to the source but reveals no other information. This allows users to prove specific attributes without exposing their full identity or sensitive data, a core principle of self-sovereign identity (SSI) and minimal disclosure.

The technical workflow typically involves three parties: the holder of the source credential, the issuer who originally signed it, and a verifier who needs proof of a specific claim. The holder presents their source credential to a derivation service or wallet. Using cryptographic protocols like BBS+ signatures or zk-SNARKs, the service generates a new, signed credential containing only the derived claim. This new credential can be independently verified by the verifier against the issuer's public key, confirming its authenticity without any interaction with the original issuer or access to the holder's private data.

In blockchain and Web3 contexts, derived credentials are crucial for sybil-resistance and reputation portability. For example, a user could derive a credential from their on-chain history proving they are a "long-term token holder" to access a governance forum, or from a verified off-chain KYC to prove they are "accredited" for a token sale—all without linking their wallet address to their legal name. This enables compliant, privacy-focused interactions in decentralized finance (DeFi), decentralized autonomous organizations (DAOs), and other applications requiring trust without total transparency.

key-features
TECHNICAL PRIMER

Key Features of Derived Credentials

Derived credentials are cryptographic attestations generated from a user's primary identity, enabling selective disclosure and privacy-preserving verification in decentralized systems.

01

Selective Disclosure

A core privacy mechanism allowing users to prove specific claims from a credential without revealing the entire document. For example, proving you are over 21 from a driver's license without disclosing your exact birthdate, address, or license number. This is typically achieved using zero-knowledge proofs (ZKPs) or BBS+ signatures.

02

Non-Transferable & Bound

Derived credentials are cryptographically bound to the holder's decentralized identifier (DID) or wallet, preventing them from being shared or used by anyone else. Binding is enforced via digital signatures or ZK proofs of key ownership. This ensures the credential is a personal attestation, not a transferable asset like an NFT.

03

Minimal On-Chain Footprint

To preserve scalability and privacy, the bulk of credential data remains off-chain (e.g., in the user's wallet). Only essential cryptographic commitments, such as a hash or a state root, are stored on-chain. Verifiers check these commitments against a proof presented by the user, avoiding the storage of personal data on a public ledger.

04

Revocation & Expiry

Mechanisms exist to invalidate credentials. Common patterns include:

  • Revocation Registries: An on-chain or off-chain list of revoked credential identifiers.
  • Status Lists: W3C-standardized bitstrings indicating credential status.
  • Time-based Expiry: Built-in validity periods enforced by the verifier. This ensures credentials reflect current, valid states.
05

Composability & Aggregation

Multiple derived credentials can be aggregated into a single proof. A user can combine proofs of age, residency, and accredited investor status from different issuers to satisfy a complex requirement (e.g., for a financial service) in one transaction. This reduces verification overhead and improves user experience.

06

Standardized Formats (W3C VC)

Interoperability is driven by standards, primarily the W3C Verifiable Credentials (VC) Data Model. This defines a common structure for credentials, proofs, and presentation formats, enabling credentials issued on one platform to be verified by another. JSON-LD with Linked Data Proofs is a common implementation.

common-use-cases
DERIVED CREDENTIAL

Common Use Cases & Examples

Derived credentials are not just a theoretical concept; they are actively used to solve real-world problems in decentralized identity and finance. Here are key applications.

02

Under-Collateralized Lending

In DeFi, derived credentials enable trust-based lending without over-collateralization. A lender can issue a loan based on a borrower's creditworthiness score, derived from their on-chain financial behavior. Key data points include:

  • Consistent repayment history
  • Wallet age and activity
  • Diversity of assets and protocols used This creates a reputational collateral layer, allowing for capital-efficient loans similar to traditional credit but with transparent, algorithmic scoring.
03

DAO Governance & Delegation

Decentralized Autonomous Organizations (DAOs) use derived credentials to weight voting power and delegate authority. A governance credential can be derived from a member's contributions, such as:

  • Length of membership
  • Number of successful proposals authored
  • Consistent participation in votes This moves governance beyond simple token-weighted voting, creating a system where reputation and proven engagement grant increased influence, aligning incentives with long-term contributors.
04

Access Gating & Token-Gated Experiences

Derived credentials control access to exclusive digital and physical spaces. Instead of just checking for a specific NFT, a gate can verify a more nuanced credential. Examples include:

  • Access to a private Discord channel for wallets with >1 year of activity in the ecosystem.
  • Entry to an IRL event for users with a credential proving attendance at three prior events.
  • Premium API access for developers whose wallets show a history of building on the protocol. This allows for dynamic, behavior-based gating beyond static asset ownership.
05

Compliance & Regulatory Proofs

Institutions use derived credentials to demonstrate compliance without exposing raw user data. A protocol can generate a zero-knowledge proof that a user has passed KYC/AML checks with a verified provider. This creates a portable, privacy-preserving credential that can be presented to multiple DeFi platforms. It enables regulated DeFi participation by proving eligibility (e.g., accredited investor status, jurisdiction) while maintaining user privacy and data minimization principles.

06

Cross-Protocol Reputation Portability

A user's reputation built on one platform becomes a usable asset on another. A contribution credential earned in a governance DAO could be used to get a discount on fees in a lending protocol. A liquidity provider score from one AMM could lower collateral requirements on a different borrowing platform. This breaks down reputation silos, creating a composable identity layer where positive behavior in one ecosystem provides tangible benefits across the broader Web3 landscape.

CREDENTIAL ARCHITECTURE

Original Credential vs. Derived Credential

A comparison of the core properties and security models of a primary digital credential and a derived, limited-use proof.

FeatureOriginal CredentialDerived Credential

Data Scope

Full credential data set (e.g., all attributes, metadata)

Selective, minimal subset of attributes (e.g., 'over 21')

Cryptographic Binding

Directly signed by the Issuer

Zero-Knowledge Proof (ZKP) or signature derived from the original

Revelation Risk

High (exposes all data to Verifier)

Low (reveals only the proven claim)

Reusability & Correlation

High (same credential reused creates a linkable identity graph)

Low (single-use, context-specific, non-linkable proofs)

Storage Location

Holder's secure wallet (custodial or non-custodial)

Can be ephemeral; often generated on-demand and discarded

Verification Method

Check Issuer's signature on full payload

Verify the cryptographic proof against the Issuer's public key and proof statement

Primary Use Case

Initial issuance and long-term storage of authority-granted data

Privacy-preserving, minimal disclosure for specific transactions

technical-mechanisms
DERIVED CREDENTIAL

Technical Mechanisms & Proof Types

A Derived Credential is a cryptographically verifiable claim generated by applying a function or proof to an existing credential, creating a new attestation without revealing the underlying data.

01

Core Mechanism: Zero-Knowledge Proofs

The most common method for deriving credentials uses zero-knowledge proofs (ZKPs). A prover generates a proof that they possess a valid credential meeting certain criteria (e.g., 'over 18') without revealing the credential itself (e.g., exact birth date). This proof becomes the new, derived credential. Key components include:

  • Witness: The private input (the original credential data).
  • Constraint System: The rules to be proven (the predicate).
  • Proof: The compact, verifiable output.
02

Selective Disclosure & Predicates

Derived credentials enable selective disclosure. Instead of sharing a full credential, a user proves a specific predicate about it. Common predicate types include:

  • Range Proofs: 'Age ≥ 21', 'Balance > $1000'.
  • Set Membership: 'Citizenship is in {Country A, Country B}'.
  • Logical Operations: 'Credential A AND Credential B are valid'. This transforms a broad identity document into a minimal, context-specific attestation.
03

Privacy-Preserving Linkability

A critical feature is controlling linkability. Derived credentials can be crafted to be:

  • Unlinkable: Each use generates a unique, non-correlatable proof, preventing service providers from tracking a user across sessions.
  • Linkable by Design: Some systems use pseudonyms or scope-specific keys to allow controlled linking within a single application (e.g., a user's recurring activity on one platform) without exposing their global identity. The choice depends on the use case's privacy requirements.
04

Verification & On-Chain vs. Off-Chain

Verification is the process where a verifier checks the derived credential's proof against the public parameters of the system.

  • On-Chain Verification: The proof and verification logic are executed as a smart contract. This is used for decentralized applications, like proving eligibility for a token airdrop. Gas costs are a consideration.
  • Off-Chain Verification: The proof is verified by a server or client application. This is common for traditional web2 login flows or access control, offering lower latency and cost. The verification key is public and often stored in a decentralized registry.
06

Related Concept: Verifiable Credentials (VCs)

Derived credentials are often an advanced feature within the W3C Verifiable Credentials (VC) data model. A standard VC is a signed JSON-LD or JWT document. A derived credential can be thought of as a ZK-Proof Verifiable Presentation. Key distinctions:

  • Standard VC Presentation: Reveals the credential's contents, with optional blinding.
  • Derived Credential (ZK Presentation): Reveals only the truth of a statement about the credential. This makes derived credentials a privacy-enhancing layer atop existing VC ecosystems.
security-considerations
DERIVED CREDENTIAL

Security & Privacy Considerations

Derived credentials are cryptographic proofs generated from a user's primary identity or wallet, enabling selective disclosure and privacy-preserving verification without exposing the underlying data.

01

Selective Disclosure

A core privacy mechanism where a derived credential proves a specific claim (e.g., "over 21") without revealing the entire source document (e.g., a driver's license). This is achieved using zero-knowledge proofs (ZKPs) or BBS+ signatures, minimizing data exposure and adhering to the principle of data minimization.

02

Credential Revocation & Expiry

Managing the lifecycle of derived credentials is critical for security. Systems must handle:

  • Revocation Status: Checking if the source credential has been revoked (e.g., via a revocation list or accumulator).
  • Expiration: Enforcing time-bound validity periods on the derived proof.
  • Compromise Response: Mechanisms to invalidate all derived credentials if the root private key is compromised.
03

Linkability & Correlation Risks

A major privacy threat is correlation, where multiple uses of a derived credential can be linked back to the same user or primary identity. Mitigations include:

  • Unlinkable Proofs: Using ZKPs that generate unique, non-correlatable signatures for each presentation.
  • Blinding Techniques: Employing cryptographic blinding to sever the link between issuance and presentation.
  • Credential Scope: Limiting the contexts in which a specific derived credential can be used.
04

Trust in Issuers & Verifiers

Security depends on the trustworthiness of the ecosystem participants:

  • Issuer Authenticity: Verifying the cryptographic signature of the issuing authority (DID, public key).
  • Verifier Policies: Assessing what data the verifier requests and how it will be stored/processed.
  • Schema Integrity: Ensuring the credential schema is well-defined and tamper-proof to prevent semantic attacks.
05

Key Management & Storage

The security of the private key used to generate and present derived credentials is paramount. Considerations include:

  • Secure Enclaves: Using hardware security modules (HSMs) or trusted execution environments (TEEs) for key storage.
  • Decentralized Identifiers (DIDs): Allowing user-controlled key rotation and recovery.
  • Wallet Security: Relying on the security model of the user's wallet (custodial vs. non-custodial, seed phrase management).
06

Regulatory Compliance (GDPR, eIDAS)

Derived credential systems must be designed for compliance with data protection regulations:

  • Right to Erasure: Technical feasibility of deleting or revoking credentials.
  • Data Portability: Ability to transfer credentials between providers.
  • Purpose Limitation: Ensuring derived proofs are only used for their intended, disclosed purpose.
  • Audit Trails: Maintaining necessary logs for regulated issuers without compromising user privacy.
DERIVED CREDENTIAL

Common Misconceptions

Derived credentials are a powerful concept in decentralized identity, but their specific mechanics and implications are often misunderstood. This section clarifies frequent points of confusion.

No, a derived credential is not a copy; it is a new, cryptographically verifiable statement derived from an original credential, containing only a subset of its data. The process uses zero-knowledge proofs (ZKPs) or selective disclosure to create a new attestation. For example, from a driver's license credential, you can derive a proof that you are over 21 without revealing your exact birth date, name, or address. The derived credential maintains a cryptographic link to the issuer's signature on the original, ensuring its authenticity, but it intentionally withholds the full information.

DERIVED CREDENTIAL

Frequently Asked Questions (FAQ)

Common questions about Derived Credentials, a core concept in decentralized identity and verifiable credentials.

A Derived Credential is a new, cryptographically verifiable credential that is issued based on the selective disclosure of data from one or more existing source credentials, allowing for minimal and context-specific data sharing. It works by using cryptographic techniques like zero-knowledge proofs (ZKPs) or BBS+ signatures to create a new proof that asserts a specific claim (e.g., 'over 21') without revealing the underlying credential's full data (e.g., exact birth date or document number). This enables privacy-preserving verification where the derived credential's validity is cryptographically linked to and dependent on the issuer's signature of the source credential.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team