Papers
Topics
Authors
Recent
Search
2000 character limit reached

European Digital Identity Wallet (EUDIW)

Updated 3 February 2026
  • European Digital Identity Wallet is a harmonized digital identity system that enables secure, privacy-preserving authentication and verifiable credential exchange for EU citizens and businesses.
  • It integrates regulated public key infrastructures, distributed ledgers, and advanced cryptographic protocols like DIDComm and selective disclosure to ensure data minimization and user control.
  • Key applications include cross-border e-government services, educational verification, and privacy-preserving e-voting, supported by evolving standards and robust interoperability.

The European Digital Identity Wallet (EUDIW) is the cornerstone of the European Union’s vision for a harmonized digital identity architecture supporting secure, privacy-preserving, and interoperable authentication and credential exchange for all citizens, residents, and businesses operating within the EU. Conceived within the eIDAS 2.0 framework, the EUDIW is a user-controlled application—typically mobile or desktop—that enables storage, selective disclosure, and presentation of government-issued and third-party verifiable credentials for pan-European cross-border interactions. As an infrastructure element, the EUDIW represents a convergence point for regulated PKI, distributed ledger technologies, privacy-enhancing cryptography, and emerging trust establishment paradigms, while being shaped by evolving technical standards, regulatory requirements, and systematizations of self-sovereign and decentralized identity models.

1. Architectural Models and Core Components

The EUDIW encompasses a set of modular core components, supporting protocols, and trust anchors, designed to combine interoperability across Member States with strong data minimization and user agency. The canonical architecture, as synthesized from eIDAS 2.0 and major technical proposals, includes the following elements:

  • Wallet (Holder Module): Manages multiple Decentralized Identifiers (DIDs), associated cryptographic key pairs, and stores Verifiable Credentials (VCs) as JSON-LD documents with cryptographic proofs in encrypted local or user-controlled cloud storage. Secure key management relies on Secure Elements (SE), Trusted Platform Modules (TPM), or user devices' secure enclaves, supporting biometric/PIN protection and device-bound key recovery (Der et al., 2017, Kasimatis et al., 2022, Jacobino et al., 2022).
  • Issuers: eIDAS-certified authorities (government, banks, universities, telecoms) issue signed VCs that encapsulate various attributes (e.g., name, date of birth, degree, VAT number) following standardized credential schemas.
  • Verifiers: Relying parties (public or private sector) request VCs at mandated assurance levels, perform validation of proofs, schema compliance, and check for credential revocation status.
  • Trust Registry/Ledger: A distributed, permissioned ledger (e.g., EBSI), anchors Issuer DIDs, public key information, credential schemas, and revocation registries, with optional on-chain anchoring of credential hashes for audit and integrity (Kasimatis et al., 2022).
  • Consent and Audit Mechanisms: All consent for data sharing is explicitly logged, with the right to erasure enforced by off-chain storage of attributes and only non-personal hashes appearing on-chain (Der et al., 2017).

A high-level data flow begins with DID and keypair generation by the holder, credential issuance (signed VC), holder-side storage, presentation requests with selective disclosure, and cryptographic verification by verifiers, anchored to on-chain trust registries for non-repudiation and revocation status (Der et al., 2017, Kasimatis et al., 2022).

2. Protocols, Cryptographic Primitives, and Selective Disclosure

The EUDIW relies on standardized protocols and advanced cryptographic tools to achieve privacy-preserving, verifiable, and flexible attribute-based authentication. Key protocols include:

  • DIDComm: RFC 0334 family enables peer-to-peer, authenticated, and confidential communication leveraging DIDs for secure key agreement and routing.
  • W3C Verifiable Credentials Data Model 1.0: Credentials are modeled as JSON-LD objects with extensible proof types (e.g., Ed25519Signature2018, BbsBlsSignature2020 supporting Zero-Knowledge Proofs, or ZKPs).
  • OpenID4VCI/OpenID4VP: Defines issuance and presentation flows based on OAuth 2.0, supporting SD-JWT and mdoc for selective attribute disclosure under the ARF’s requirements (Termont et al., 20 Jan 2026, Biedermann et al., 2024, Sitouah et al., 27 Jan 2026).
  • Anonymous Credentials (BBS+/BBS): Pairing-based signature schemes supporting multi-attribute credentials, unlinkable selective disclosure, and formal security against collusion. For a credential:

σBBS.Sign(skI,A)\sigma \leftarrow \mathsf{BBS.Sign}(\mathit{sk}_I,\mathbf A)

Selective disclosure supported by efficient ZKPs proving knowledge of σ\sigma, with privacy guarantees (Slamanig, 13 Jan 2025).

  • General-purpose zk-SNARKs: Entire attribute validation, range proofs, revocation status, and possession can be combined into efficient non-interactive proofs. Performance measurements confirm sub-second proof generation and verification even on mobile hardware (Babel et al., 2023).
  • Pseudonymity and Scope-based Sybil-Resistance: Pseudonyms for each relying party are derived from secret pseudonym seeds and contextual PRFs (e.g., nym=PRFpns(scpidx)nym = \mathsf{PRF}_{pns}(scp\,\|\,idx)), with SNARK or BBS-based NIZK proofs enforcing unlinkability and Sybil-resistance (Mayrhofer et al., 6 Oct 2025, Jóźwik et al., 13 Jul 2025).

Selective disclosure is realized via Merkle-commitment-based SD-JWTs, BBS+ signature ZKPs, or SNARK-based disclosure, enabling per-presentation minimization of revealed data while maintaining verifiability and regulatory compliance (Babel et al., 2023, Sitouah et al., 27 Jan 2026).

3. Governance Frameworks, Certification, and Interoperability

The EUDIW ecosystem is governed by a layered trust framework:

  • eIDAS 2.0 Regulation: Mandates the deployment of voluntary, user-controlled wallets by all Member States, with credential lifecycle operations under the sole control of the user but legal identity attestation retained by competent authorities (Sitouah et al., 27 Jan 2026).
  • Technical Standardization: The Architectural Reference Framework (ARF v1.4.0) prescribes OpenID/OAuth flows, SD-JWT for selective disclosure, and defines operational assurances. Evaluation and certification of wallet software rely on Conformity Assessment Bodies (CABs), with instance attestation protocols (e.g., via WSCD or WSCA) (Sitouah et al., 27 Jan 2026).
  • Trust Service Provider Registries and Relying Party Lists: Each Member State maintains publicly auditable registries of issuers and RPs, with cross-border recognition as per mutual recognition principles. Credential revocation status is available via PKI CRL/OCSP or Merkle-accumulator ledgers.
  • Decentralized Infrastructure: EBSI, in concert with domain-specific frameworks (e.g., GLASS, TrustVault), anchors DIDs, credential schemas, issuer keys, and enables on/off-chain verifiability, scaling cross-member state credential acceptance (Kasimatis et al., 2022, Jacobino et al., 2022).
  • Certification of Assurance Levels: Wallets and credentials are certified at specified eIDAS assurance levels (“low,” “substantial,” “high”), with support for hardware-backed secure key storage and remote attestation (Sitouah et al., 27 Jan 2026).
  • Interoperability: The EUDIW incorporates standards for credential and DID representation (W3C VC, DIDs), revocation (VC status list, Merkle roots), protocol (OIDC, DIDComm), and supports translation layers to Web3 contexts for DeFi, dApps, and cross-registry trust (Biedermann et al., 2024, Vaziry et al., 20 Jan 2026).

4. Security, Privacy, and Data Minimization Properties

EUDIW implementations are designed for robust security and mathematically established privacy guarantees:

  • Zero-Knowledge Selective Disclosure: Range proofs and predicate proofs (e.g., age 18\geq 18) via BBS+/SNARK or Schnorr-style protocols allow proving statements about attributes without revealing them, achieving both minimal disclosure and GDPR compliance (Der et al., 2017, Slamanig, 13 Jan 2025).
  • Unlinkability: Architectures employing SNARKs, randomized BBS+ credentials, or per-presentation pseudonyms prevent correlation even under issuer-RP collusion (Slamanig, 13 Jan 2025, Mayrhofer et al., 6 Oct 2025).
  • Data at Rest and in Transit: All secrets are held device-side, encrypted using hardware-backed modules. Peer-to-peer communication leverages end-to-end authenticated encryption (e.g., X25519-ECDH, AES-GCM) (Jacobino et al., 2022).
  • Revocation and Audit: Credential status and access requests are tracked in registries via opaque identifiers or bloom filters, preserving privacy under public audit requirements (Jacobino et al., 2022).
  • Trusted Execution Environments (TEE): To bridge regulated eIDAS credentialing with SSI-style user control, enclave-based attestation and ZK-SNARK outputs bind statutory trust guarantees to decentralized verification and unlinkable selective-disclosure (Sitouah et al., 27 Jan 2026).
  • Pseudonymity Construction: Formal models ensure soundness, non-frameability, context-exclusivity, and transferability for scope-bound pseudonyms via either hash-based or pairing-based construction, formally analyzed for privacy and security under commonly accepted assumptions (Mayrhofer et al., 6 Oct 2025).

5. Applications, Integration, and Performance

EUDIW covers a wide scope of use cases, spanning public and private sector authentication, document sharing, privacy-preserving e-voting, and future on-chain business operations:

  • E-Government and Education: Cross-border issuance and presentation of diplomas or licenses, with workflow flows anchored on EBSI/GLASS, support federation-wide mutual recognition (Kasimatis et al., 2022).
  • Privacy-Preserving E-Voting: Mobile wallet–centric voting protocols achieve Sybil-resistant registration, anonymous credential-based vote casting, and full verifiability on decentralized ledgers (e.g., TrustChain), with sub-second cryptographic operation latencies on contemporary devices (Jóźwik et al., 13 Jul 2025).
  • Attribute-Based Access Control: Fine-grained access policies over user-owned resources using expressive Boolean policies and ZKP-based attribute proofs (Jacobino et al., 2022).
  • On-Chain Identity: Full eIDAS trust anchoring into public blockchains for Know Your Counterparty/Contract (KYB/KYC) compliance, using P-256/CAdES-BES QSeal certificates and on-chain registry smart contracts compatible with PSD2, MiCA, and European Business Wallet requirements (Vaziry et al., 20 Jan 2026).
  • Performance: Proof generation and verification (BBS+/SNARK) consistently operate within sub-second to a few seconds on mobile and edge devices, with scalable revocation, credential chaining, and hardware token integration pathways established (Babel et al., 2023, Jóźwik et al., 13 Jul 2025).

6. Open Challenges, Limitations, and Research Trajectories

Despite substantial progress, several critical issues persist in EUDIW deployment and research:

  • Centralization vs. Self-Sovereignty: Current regulatory and architectural realities impose centralized trust anchors, government-issued identifiers, and registry-based RP lookup, constraining unrestricted SSI-style autonomy and pseudonym adoption (Sitouah et al., 27 Jan 2026, Termont et al., 20 Jan 2026).
  • Privacy Limitations in Baseline Implementations: The ARF’s salted-hash credential signature formats exhibit clear linkability shortcomings, failing multi-show unlinkability unless evolved to full anonymous credentials (Slamanig, 13 Jan 2025).
  • Standardization Lag and Hardware Gaps: Widespread adoption of pairing-based anonymous credentials (BBS+/BBS) is slowed by standards ratification and lack of pairing curve support in hardware security modules (Slamanig, 13 Jan 2025).
  • Query and Presentation Expressivity: Existing OpenID4VP and DCQL offer insufficient expressivity for cross-credential queries and dynamic, graph-based data selection, requiring semantic meta-languages for more general attestations (Termont et al., 20 Jan 2026).
  • Semantic Interoperability with Web3: Integration between eIDAS 2.0–compliant credentials and permissionless ledger-based or dApp identification (Web3/DIDComm) is hampered by protocol and crypto suite mismatches, but bridging architectures (hybrid DIDs, encrypted pointers, and on-chain hash anchors) are proposed (Biedermann et al., 2024).
  • Recovery and Key Management: Persistence, rotated device, and social recovery features remain poorly specified in regulation and architecture, impeding user-centric recoverability (Sitouah et al., 27 Jan 2026).
  • Post-Quantum Migration: Transition strategies for future-proofing EUDIW against quantum adversaries are under preliminary academic investigation, with lattice-based or SNARK-wrapped credential schemes as candidates (Slamanig, 13 Jan 2025).
  • Auditability and Openness: While GDPR and eIDAS demand transparency and auditability, practical realization of open-source, ledger-anchored audit logs, and public scrutiny of certification and registration events is emerging but not yet uniform (Sitouah et al., 27 Jan 2026).

7. Roadmap, Recommendations, and Future Work

A multi-phased deployment and evolution is established for EUDIW:

Phase Milestones Timeline
Foundation Trust Registry governance, DID and schema standardization, reference implementations 0–6 months
Pilots & Interop Cross-border pilots (e-health, student mobility), end-to-end flow testing, UX refinement 6–18 months
Scale & Certification Production-grade Trust Registry, national/private issuer onboarding, wallet certification, large-scale credential issuance 18–36 months
Consolidation Legal and technical profile updates (eIDAS 2.0+), extension to IoT/device identities, standard and cryptographic suite innovation (quantum-safe, privacy-enhancing) >36 months

Best practices and actionable recommendations include: enforcing selective disclosure-by-default, legally recognizing DIDs for broader identifier options, designing non-custodial recovery frameworks, establishing open and auditable infrastructure, actively piloting BBS+ and ZK-based credential schemes, and systematically decoupling trusted party and registry centralization (Der et al., 2017, Sitouah et al., 27 Jan 2026, Termont et al., 20 Jan 2026).

Research is focusing on semantic query frameworks, post-quantum migration, optimized TEE/ZK based verification, rich cross-registry interoperability, and new privacy-preserving protocols (e.g., ring signatures, advanced pseudonym systems) to bolster privacy and user autonomy (Kasimatis et al., 2024, Mayrhofer et al., 6 Oct 2025, Biedermann et al., 2024).

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to European Digital Identity Wallet (EUDIW).