Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 175 tok/s
Gemini 2.5 Pro 51 tok/s Pro
GPT-5 Medium 32 tok/s Pro
GPT-5 High 26 tok/s Pro
GPT-4o 130 tok/s Pro
Kimi K2 191 tok/s Pro
GPT OSS 120B 425 tok/s Pro
Claude Sonnet 4.5 37 tok/s Pro
2000 character limit reached

Compact and Selective Disclosure for Verifiable Credentials (2506.00262v1)

Published 30 May 2025 in cs.CR

Abstract: Self-Sovereign Identity (SSI) is a novel identity model that empowers individuals with full control over their data, enabling them to choose what information to disclose, with whom, and when. This paradigm is rapidly gaining traction worldwide, supported by numerous initiatives such as the European Digital Identity (EUDI) Regulation or Singapore's National Digital Identity (NDI). For instance, by 2026, the EUDI Regulation will enable all European citizens to seamlessly access services across Europe using Verifiable Credentials (VCs). A key feature of SSI is the ability to selectively disclose only specific claims within a credential, enhancing privacy protection of the identity owner. This paper proposes a novel mechanism designed to achieve Compact and Selective Disclosure for VCs (CSD-JWT). Our method leverages a cryptographic accumulator to encode claims within a credential to a unique, compact representation. We implemented CSD-JWT as an open-source solution and extensively evaluated its performance under various conditions. CSD-JWT provides significant memory savings, reducing usage by up to 46% compared to the state-of-the-art. It also minimizes network overhead by producing remarkably smaller Verifiable Presentations (VPs), reduced in size by 27% to 93%. Such features make CSD-JWT especially well-suited for resource-constrained devices, including hardware wallets designed for managing credentials.

Summary

  • The paper introduces CSD-JWT, a protocol that uses ECC-based cryptographic accumulators to enable compact verifiable credentials.
  • It achieves significant efficiency gains, including up to 46% reduction in memory usage and 27-93% smaller presentations.
  • The design mitigates privacy risks and replay attacks, making it ideal for SSI applications in resource-constrained environments.

Compact and Selective Disclosure for Verifiable Credentials

Introduction

The paper "Compact and Selective Disclosure for Verifiable Credentials" introduces CSD-JWT, a mechanism for enhancing privacy and efficiency in the Self-Sovereign Identity (SSI) model through compact and selective disclosure of Verifiable Credentials (VCs). The paper addresses current limitations and privacy concerns associated with existing selective disclosure mechanisms, notably the SD-JWT, by utilizing an ECC-based cryptographic accumulator to encode claims. This method provides significant reductions in memory and computational overhead, particularly benefiting resource-constrained environments like IoT devices and hardware wallets.

Self-Sovereign Identity and Verifiable Credentials

SSI models empower individuals by granting them control over their digital identities, relying on VCs issued by trusted authorities. These VCs cryptographically verify specific attributes of the holder. A critical feature of SSI is the ability for users to selectively disclose claims from their credentials, an advancement beyond traditional centralized identity systems, which depend on inflexible and often privacy-invasive data-sharing practices.

CSD-JWT: Methodology and Implementation

The core of the proposed CSD-JWT system is its use of cryptographic accumulators to replace the plaintext list of claims within a VC with a fixed-length encoded value, ensuring compactness and reduced storage needs. During issuance, an issuer generates an accumulator value incorporating hashed claims, and provides claim-specific witnesses to the holder. The holder generates a Verifiable Presentation (VP) by disclosing only selected claims and their proofs, minimizing data exposure and maintaining constant credential size, which guards against inference attacks. Figure 1

Figure 1: SSI reference system.

Implementation-wise, CSD-JWT allows holders to create VPs devoid of a full claims list, communicating only the necessary claims and corresponding proofs. This approach slashes storage requirements and enhances issuer and verifier operations without inflating computational demands on constrained devices, as shown in performance evaluations.

Performance and Security Evaluation

The performance assessment of CSD-JWT versus the SD-JWT reveals significant storage savings, achieving up to a 46% reduction in memory usage per credential. Network efficiency is similarly enhanced, with CSD-JWT reducing VP sizes by 27-93%, depending on claim disclosure levels. Figure 2

Figure 2: Issuer overhead for generating VCs.

Security-wise, CSD-JWT shields against replay attacks, ensures data minimization, and remains robust against compromised communication channels by employing cryptographic accumulations and well-defined signature checks. Its setup aligns with the Dolev-Yao model, mitigating most common adversarial threats in open communication networks.

Applications and Implications

By effectively marrying privacy preservation with scalability in verifiable credentials, CSD-JWT offers compelling benefits for diverse applications, particularly those requiring lightweight credential handling. Potential use cases span from digital credentials in government-issued IDs to IoT devices requiring rapid, secure identity verification with minimal overhead.

Conclusion

"Compact and Selective Disclosure for Verifiable Credentials" presents a practical, efficient protocol for achieving selective disclosure in SSI systems. Through meticulous evaluation and empirical validation, it establishes CSD-JWT as an advanced alternative to existing systems like SD-JWT. Its design promotes both privacy and practicality, marking a forward step in decentralized identity management, and is especially promising for scalable deployment across IoT and low-resource frameworks, ensuring commitment to future-proofing digital identities amidst rapidly evolving regulatory landscapes.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.