Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Credential Format

A credential format is the specific data model, syntax, and serialization standard used to structure and encode a verifiable credential (VC).
Chainscore © 2026
definition
DECENTRALIZED IDENTITY

What is a Credential Format?

A credential format is the technical specification that defines the structure, data model, and cryptographic methods for creating, issuing, and verifying digital credentials, such as those used in Decentralized Identity (DID) and Verifiable Credentials (VCs).

In the context of Decentralized Identity (DID) and Verifiable Credentials (VCs), a credential format is a formalized data schema that dictates how claims—such as a person's name, age, or professional certification—are packaged into a cryptographically secure, machine-readable document. It specifies the syntax for the credential's metadata, the structure of the claims, the supported proof mechanisms (like digital signatures or zero-knowledge proofs), and the rules for revocation. Common formats include the W3C Verifiable Credentials Data Model, JSON Web Tokens (JWT), and JSON-LD with Linked Data Proofs. The choice of format determines interoperability, proof expressiveness, and privacy features.

The evolution of credential formats reflects a shift from centralized, proprietary systems to open, interoperable standards. Early formats were often simple signed JSON or XML blobs tied to a specific issuer's system. Modern formats, like those built on the W3C VC Data Model, are designed for portability across different ecosystems, known as trust frameworks. They enable features like selective disclosure, where a user can reveal only specific attributes from a credential (e.g., proving they are over 21 without revealing their exact birthdate), and cryptographic agility, allowing for the use of various signature suites like EdDSA, BBS+ signatures, or zk-SNARKs.

Selecting the appropriate credential format is a critical architectural decision. For instance, the JWT VC format is compact and widely supported in web infrastructure, making it suitable for simple attestations. In contrast, JSON-LD with BBS+ signatures supports advanced privacy-preserving capabilities, enabling predicate proofs and unlinkable presentations. The format also defines how a Verifiable Presentation—a holder's package of one or more credentials for a verifier—is constructed. As the ecosystem matures, formats like SD-JWT (Selective Disclosure JWT) and MDOC (ISO 18013-5 mobile driver's license) are emerging to address specific use cases in digital identity and access management.

how-it-works
DATA STRUCTURES

How Credential Formats Work

A credential format is the standardized data structure and encoding method used to represent a verifiable credential, defining how claims are packaged, signed, and exchanged between systems.

A credential format is the technical blueprint for a digital credential, specifying its serialization, cryptographic proof mechanism, and core data model. Common formats include W3C Verifiable Credentials (VCs), which use JSON-LD or JWT serializations, and AnonCreds, which is optimized for selective disclosure and zero-knowledge proofs using CL signatures. The choice of format dictates interoperability, the types of cryptographic proofs available (e.g., digital signatures vs. zero-knowledge proofs), and the complexity of the verification process. It is a foundational layer separate from the credential schema, which defines the actual data fields.

The primary function of a credential format is to ensure cryptographic verifiability and data integrity. When an issuer creates a credential, they package the claims according to the format's rules and bind them to the holder's Decentralized Identifier (DID) using a cryptographic signature or proof. This creates a tamper-evident package. Formats like SD-JWT (Selective Disclosure JWT) extend this by allowing holders to reveal only specific claims from a signed credential, enhancing privacy. The format also defines how revocation status—whether a credential is still valid—is communicated, often through a revocation registry or status list.

Interoperability between different trust ecosystems hinges on supporting common credential formats. For instance, a credential issued in the AnonCreds format within a Hyperledger Indy ecosystem may not be directly verifiable by a verifier's system that only supports W3C VC-JWT. Format translators or wallets that support multiple formats are often required to bridge these gaps. Standardization bodies like the W3C and Decentralized Identity Foundation (DIF) work to define and promote interoperable formats, with the W3C VC Data Model serving as a widely adopted conceptual framework that various formats implement.

When selecting a format, issuers must balance requirements for privacy, proof expressiveness, and computational overhead. Zero-knowledge proof-based formats like AnonCreds or BBS+ signatures enable sophisticated privacy-preserving features but can be more complex to implement. Simpler JWT-based formats offer ease of use and broad library support but may reveal all credential data upon presentation. The format also influences holder autonomy; some formats require interaction with the issuer during presentation, while others support holder-bound credentials that can be presented offline.

key-features
TECHNICAL FOUNDATIONS

Key Features of Credential Formats

Credential formats define the data structure and cryptographic methods used to issue, hold, and verify digital attestations. The choice of format dictates interoperability, privacy, and security guarantees.

01

Data Model & Structure

The format specifies the schema for credential data, including claims (key-value pairs), metadata (issuer, issuance date, expiration), and proofs. Common structural patterns include:

  • W3C Verifiable Credentials (VCs): A JSON-LD-based standard for semantic interoperability.
  • JSON Web Tokens (JWTs): A compact, URL-safe token format using JSON objects.
  • AnonCreds: A format using CL signatures and link secrets for advanced privacy.
02

Cryptographic Proofs

Formats embed or reference cryptographic proofs to enable verification. The proof type determines security and privacy properties.

  • Digital Signatures: Provide data integrity and issuer authentication (e.g., EdDSA, ES256K).
  • Zero-Knowledge Proofs (ZKPs): Enable selective disclosure, allowing a holder to prove a claim without revealing the underlying data (e.g., BBS+ signatures in ZKPs).
  • JSON Web Signatures (JWS): The standard signing method for JWT-based credentials.
03

Holder Privacy & Selective Disclosure

A critical feature is the ability for the credential holder to control what information is shared. Formats enable this through:

  • Blind Signatures: The issuer signs a credential without seeing its contents.
  • Predicate Proofs: Proving a statement about a claim (e.g., 'age > 21') without revealing the exact value.
  • Presentation Exchange: A holder can combine claims from multiple credentials into a single, verifiable presentation.
04

Interoperability & Portability

Formats determine if a credential can be used across different verifiable data registries, wallets, and verifiers. Key factors include:

  • Standard Compliance: Adherence to W3C VC or other IETF/ISO standards.
  • Decentralized Identifiers (DIDs): Using DIDs as issuer/holder identifiers ensures decentralized resolution and control.
  • Schema Registries: Referencing publicly accessible schemas ensures verifiers understand the data's meaning.
05

Revocation & Status Tracking

Mechanisms to invalidate a credential before its expiration. Formats support different revocation models:

  • Status Lists: A cryptographically secured bitstring (like a Status List 2021) where each bit represents a credential's revocation status.
  • Accumulators: Cryptographic accumulators (e.g., RSA accumulators) allow proving non-revocation without a central list.
  • On-Chain Registries: Smart contracts on blockchains like Ethereum can act as a tamper-proof revocation ledger.
06

Real-World Format Examples

W3C Verifiable Credential (JSON-LD): The semantic web standard, used by DID:Web and SSI ecosystems. Supports BBS+ signatures for ZKPs.

AnonCreds: The original Hyperledger Indy format, now a W3C community standard. Uses CL signatures, link secrets, and a revocation registry. Powers Sovrin and Indy networks.

SD-JWT (Selective Disclosure JWT): An IETF standard combining JWTs with hash disclosures, enabling compact selective disclosure without ZKP complexity.

VERIFIABLE CREDENTIALS

Comparison of Major Credential Formats

A technical comparison of key attributes across the primary formats for issuing and exchanging digital credentials on decentralized networks.

FeatureW3C Verifiable Credentials (VCs)Open BadgesSoulbound Tokens (SBTs)

Standardization Body

World Wide Web Consortium (W3C)

1EdTech Consortium

Vitalik Buterin / Community Proposal

Primary Data Model

Linked Data / JSON-LD

JSON

ERC-721 / ERC-1155 (NFT Standard)

Cryptographic Proof

Revocation Mechanism

Status List / Registry

Hosted Verification

Burn Function / Issuer Registry

Portability / Interop

Default Privacy

Selective Disclosure

Public by default

Public by default

Primary Use Case

Official IDs, Diplomas

Learning Achievements

Reputation, Membership

Typical Issuance Cost

$0.10 - $2.00

~$0

$5 - $50+ (Gas)

examples
IMPLEMENTATION STANDARDS

Examples of Credential Formats

Credential formats define the data structure and encoding for verifiable claims. These standards ensure interoperability, security, and privacy across different systems.

technical-details
TECHNICAL DETAILS: CORE COMPONENTS

Credential Format

The specific data structure and encoding standard used to represent a verifiable credential, defining its core components, proof mechanism, and interoperability.

A credential format is the technical blueprint for a verifiable credential, specifying the exact schema for its data fields, digital signatures, and metadata. Common formats include W3C Verifiable Credentials (VCs), which use JSON-LD and Linked Data Proofs, and JSON Web Tokens (JWTs), which use a compact, URL-safe token structure. The choice of format dictates the credential's interoperability, cryptographic proof type (e.g., EdDSA, ECDSA), and how it is processed by verifiers. Selecting the right format is a foundational decision that impacts the entire credential lifecycle.

The W3C Verifiable Credentials Data Model is the most widely adopted standard, promoting semantic interoperability. It structures a credential into core components: the credentialSubject (the claims about the holder), issuer, issuanceDate, and optional expirationDate. Proofs are attached using Linked Data Proofs, which can be implemented with various cryptographic suites like Ed25519Signature2020. This format's use of JSON-LD allows for extensible, context-aware data that machines can unambiguously interpret, making it ideal for complex, interconnected credential ecosystems.

In contrast, the JWT-based format encodes the credential claims and header into a compact string, signed using the JSON Web Signature (JWS) standard. This results in a smaller payload, often preferred for high-throughput or constrained environments like mobile apps. While efficient, JWT credentials typically lack the built-in semantic context of JSON-LD, which can limit their ability to express complex relationships between data points without additional约定.

Beyond these, specialized formats exist for specific use cases. AnonCreds, originally developed for Hyperledger Indy, uses CL-signatures to enable advanced privacy features like selective disclosure and predicate proofs without revealing the underlying data. SD-JWT (Selective Disclosure JWT) is an emerging IETF standard that combines the compactness of JWTs with the ability to selectively reveal individual claims, offering a balance between privacy and efficiency.

The format also defines the presentation layer—how a credential is packaged for verification. A Verifiable Presentation bundles one or more credentials, often from different issuers, under a single proof from the holder. The presentation format must be compatible with the original credential formats. This decoupling allows a holder to present a W3C VC in a JWT-based presentation, or vice-versa, using format-translation layers, though this can add complexity to the verification process.

Ultimately, the credential format is not just a serialization choice; it enforces the trust model and privacy guarantees. Developers must evaluate formats based on requirements for cryptographic agility, proof succinctness, selective disclosure capabilities, and ecosystem support. The ongoing evolution of standards aims to consolidate the strengths of different approaches, with projects like the W3C VC-JWT specification working to bring JWT's efficiency into the broader W3C VC ecosystem.

ecosystem-usage
CREDENTIAL FORMAT

Ecosystem Usage and Adoption

Credential formats define the data structure and encoding for verifiable claims, enabling interoperability across wallets, verifiers, and decentralized applications (dApps).

06

Ecosystem Interoperability

The primary challenge is ensuring credentials issued in one format (e.g., AnonCreds) can be understood by a verifier expecting another (e.g., JWT VC). Projects like the OpenID for Verifiable Credentials (OIDC4VC) suite and the W3C VC-API are building bridges. Key concepts enabling this include:

  • Credential Manifest: A standard way for a verifier to request specific credentials.
  • Presentation Exchange: A protocol for negotiating the format and content of a VP.
  • Format Transformers: Services that can convert between credential formats when cryptographic semantics allow.
security-considerations
CREDENTIAL FORMAT

Security and Privacy Considerations

The structure and encoding of a credential directly impact its security properties and the privacy guarantees it offers to holders. Key considerations include cryptographic proof formats, selective disclosure mechanisms, and revocation.

01

JSON Web Token (JWT)

A compact, URL-safe token format defined in RFC 7519, commonly used for transmitting claims between parties. In decentralized identity, JWTs can be signed using JSON Web Signatures (JWS) to create Verifiable Credentials (VCs).

  • Structure: Header (algorithm), Payload (claims), Signature.
  • Pros: Widely supported, simple to implement.
  • Cons: Data is not selectively disclosable; the entire payload is revealed upon presentation, which can compromise privacy.
02

JSON-LD with Linked Data Proofs

A W3C standard format for Verifiable Credentials that uses JSON-LD for semantic data modeling and Linked Data Proofs (e.g., Ed25519Signature2020) for cryptographic verification.

  • Selective Disclosure: Enables BBS+ signatures for deriving zero-knowledge proofs, allowing holders to reveal only specific attributes.
  • Interoperability: Uses globally unique URIs (like https://schema.org/name) to define credential schemas, promoting data portability across ecosystems.
03

AnonCreds

A privacy-preserving credential format originally developed for Hyperledger Indy, based on CL signatures. It is optimized for zero-knowledge proofs (ZKPs) and unlinkable presentations.

  • Core Features: Supports predicate proofs (e.g., proving age > 21 without revealing birthdate) and multi-credential presentations.
  • Blinding & Unlinkability: The cryptographic link between an issued credential and its subsequent presentations is broken, preventing issuer or verifier tracking.
04

Revocation Mechanisms

Methods for invalidating credentials before their natural expiration, a critical security control. The format dictates the available revocation strategy.

  • Status Lists (W3C): A cryptographically-verifiable status list (like a bitstring) published by the issuer. Verifiers check a specific index to see if a credential is revoked.
  • Accumulators: Cryptographic constructs (e.g., RSA accumulators) allow proving non-revocation without revealing the specific credential or list entry, enhancing privacy.
05

Key Binding & Holder Binding

Security features that cryptographically tie a credential to a specific holder, preventing unauthorized transfer or use.

  • Key Binding: The credential's proof is signed with a holder's private key (from their Decentralized Identifier - DID). Presentation must be signed with the same key.
  • Biometric Binding: In high-assurance scenarios, a credential can be bound to a biometric template stored in a secure enclave (e.g., a mobile device's TPM), ensuring physical possession.
06

Format Trade-offs: Privacy vs. Complexity

Choosing a credential format involves balancing privacy, performance, and implementation complexity.

  • JWT: Low complexity, but low privacy (full disclosure). Suitable for public assertions.
  • JSON-LD with BBS+: High privacy (selective disclosure), but higher computational cost and implementation complexity.
  • AnonCreds: Maximum privacy (unlinkability), but often requires a specific ledger (like Indy) for public key infrastructure, adding ecosystem dependency.
CREDENTIAL FORMATS

Common Misconceptions

Clarifying widespread misunderstandings about decentralized identity standards, their technical implementations, and practical applications.

A Verifiable Credential (VC) is a tamper-evident digital claim issued by an issuer to a holder, while a Decentralized Identifier (DID) is a persistent, cryptographically verifiable identifier that serves as the subject of those credentials. Think of a DID as a digital address or passport number, and a VC as the actual passport stamp or visa containing specific claims (like name, age, or membership status) about that DID. They are complementary components of the W3C Verifiable Credentials Data Model: DIDs enable decentralized identification, and VCs enable portable, verifiable attestations about those identities.

CREDENTIAL FORMAT

Frequently Asked Questions (FAQ)

Common questions about the technical structure and application of verifiable credentials in decentralized identity systems.

A Verifiable Credential (VC) is a tamper-evident digital credential whose authorship and integrity can be cryptographically verified. It works by packaging claims (e.g., name, degree, membership) into a standard data model, which is then signed by an issuer using a cryptographic key. The credential is presented to a verifier, who can check the issuer's signature and the credential's status without contacting the issuer directly, enabling privacy-preserving and trustless verification.

Key components of a VC include:

  • Metadata: Information about the credential type, issuer, and issuance date.
  • Claims: The actual statements or attributes being asserted.
  • Proofs: The digital signature or zero-knowledge proof that cryptographically secures the credential.
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team