Quantum-Safe Cryptosuites v0.3

Achieving Data Integrity using Post-Quantum Cryptography

Final Community Group Report

This version:
https://www.w3.org/community/reports/credentials/CG-FINAL-di-quantum-safe-20260422/
Latest published version:
https://www.w3.org/community/reports/credentials/CG-FINAL-di-quantum-safe-20260422/
Latest editor's draft:
https://w3c-ccg.github.io/di-quantum-safe/
Editors:
Andrea D'Intino (Forkbomb)
Will Abramson (Legendary Requirements)
Denis "Jaromil" Roio (Dyne)
Manu Sporny (Digital Bazaar)
Greg Bernstein (Invited Expert)
Authors:
Andrea D'Intino (Forkbomb)
Will Abramson (Legendary Requirements)
Denis "Jaromil" Roio (Dyne)
Dave Longley (Digital Bazaar)
Manu Sporny (Digital Bazaar)
Greg Bernstein (Invited Expert)
Feedback:
GitHub w3c-ccg/di-quantum-safe (pull requests, new issue, open issues)
Related Specifications
The Verifiable Credentials Data Model v2.0
Verifiable Credential Data Integrity v1.0
The Elliptic Curve Digital Signature Algorithm Cryptosuites v1.0
The Edwards Digital Signature Algorithm Cryptosuites v1.0
The BBS Digital Signature Algorithm Cryptosuites v1.0

Abstract

This specification describes several Data Integrity Cryptosuites for use when generating a digital signature using Post-Quantum digital signature algorithms.

Status of This Document

This specification was published by the Credentials Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Final Specification Agreement (FSA) other conditions apply. Learn more about W3C Community and Business Groups.

This specification is experimental, do not use it in any production setting.

GitHub Issues are preferred for discussion of this specification.

1. Introduction

This specification defines several cryptographic suites for the purposes of creating and verifying proofs for Post-Quantum signatures, in conformance with the Data Integrity [VC-DATA-INTEGRITY] specification.

This specification uses either the RDF Dataset Canonicalization Algorithm [RDF-CANON] or the JSON Canonicalization Scheme [RFC8785] to transform the input document into its canonical form. It uses a hash based on SHA-2 [RFC6234] and appropriate to the security category as the message digest, and supports a number of different Post-Quantum signature algorithms with varying properties such as public key size, signature size, and computational and implementational complexity.

1.1 Terminology

Terminology used throughout this document is defined in the Terminology section of the Verifiable Credential Data Integrity 1.0 specification.

1.2 Conformance

As well as sections marked as non-normative, all authoring guidelines, diagrams, examples, and notes in this specification are non-normative. Everything else in this specification is normative.

The key words MAY, MUST, and SHOULD in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

A conforming proof is any concrete expression of the data model that complies with the normative statements in this specification. Specifically, all relevant normative statements in Sections 2. Data Model and 3. Algorithms of this document MUST be enforced.

A conforming processor is any algorithm realized as software and/or hardware that generates or consumes a conforming proof. Conforming processors MUST produce errors when non-conforming documents are consumed.

This document contains examples of JSON and JSON-LD data. Some of these examples are invalid JSON, as they include features such as inline comments (//) explaining certain portions and ellipses (...) indicating the omission of information that is irrelevant to the example. Such parts need to be removed if implementers want to treat the examples as valid JSON or JSON-LD.

2. Data Model

The following sections outline the data model that is used by this specification to express verification methods, such as cryptographic public keys, and data integrity proofs, such as digital signatures.

2.1 Verification Methods

These verification methods are used to verify Data Integrity Proofs [VC-DATA-INTEGRITY] produced using the cryptographic key material for the various algorithms and parameter sets supported by this specification. The encoding formats for these key types are provided in this section. Lossless cryptographic key transformation processes that result in equivalent cryptographic key material MAY be used during the processing of digital signatures.

2.1.1 Multikey

The Multikey format, defined in Controlled Identifiers v1.0, is used to express public keys for the cryptographic suites defined in this specification.

The publicKeyMultibase property represents a Multibase-encoded Multikey expression of a public key.

Table 1 Public Key Summary, all sizes in bytes.
Signature Name Varint Code Multi-Byte Prefix Raw Public Key Size
ML-DSA-44 0x1210 0x9024 1312
SLH-DSA-SHA2-128s 0x1220 0xa024 32
FALCON-512* 0x122c 0xac24 897
SQIsign-I* 0x122e 0xae24 65

The Multikey encoding of a public key for a signature supported by this specification MUST start with the corresponding multi-byte prefix for the signature named in Table 1 followed by the raw public key bytes. This multi-byte prefix is the varint expression of the varint code given in the previous table. The resulting value will have a byte length given by the raw public key size in the table plus the length of the multi-byte prefix. This value MUST then be encoded using the base-64-url alphabet, according to the Multibase section of Controlled Identifiers v1.0 and then prepended with the base-64-url Multibase header (u).

Examples of all the publicKeyMultibase encodings defined in this specification can be found in appendix A. Test Vectors.

Editor's note

Note*: The codes given in Table 1 for FALCON-512 and SQIsign-I are preliminary and not currently registered with multicodecs. When these signature schemes are formalized by NIST or other SDOs these values should be updated/registered.

2.2 Proof Representations

This section details the proof representation formats that are defined by this specification.

2.2.1 DataIntegrityProof

A proof contains the attributes specified in the Proofs section of [VC-DATA-INTEGRITY] with the following restrictions.

The type property of the proof MUST be DataIntegrityProof.

The cryptosuite property of the proof MUST be one of the following values from Table 2.

Table 2 Cryptosuites.
Name Signature Algorithm Signature Length
mldsa44-rdfc-2024 ML-DSA-44 2420
mldsa44-jcs-2024 ML-DSA-44 2420
slhdsa128-rdfc-2024 SLH-DSA-SHA2-128s 7856
slhdsa128-jcs-2024 SLH-DSA-SHA2-128s 7856
falcon512-rdfc-2024 FALCON-512 666
falcon512-jcs-2024 FALCON-512 666
sqisign1-rdfc-2024 SQIsign-I 148
sqisign1-jcs-2024 SQIsign-I 148

The value of the proofValue property of the proof MUST be a signature produced by the signature algorithm corresponding to the cryptosuite given in Table 2. This signature is produced according to using the algorithms specified in section 3. Algorithms, then encoded using the base-64-url-nopad header and alphabet as described in the Multibase section of [CID].

Examples of the proofValue for all the cryptosuites defined in this specification can be found in appendix A. Test Vectors.

3. Algorithms

The following sections describe multiple Data Integrity cryptographic suites that utilize quantum safe signature algorithms at different claimed security categories. For a given claimed security category, an appropriate hash function MUST be use in the 3.1.1 Hashing.

From Recommendation for Key Management: Part 1r6 ipd -- General, Section 4.6.1.4 on the "Security Strengths of Hash Functions, XOFs, and Their Applications," the following hash function are chosen for use with digital signatures in Table 3.

Table 3 Hashes for Signatures.
Security Strength Hash Function
Category 1 or 2 SHA-256
Category 3 or 4 SHA-384
Category 5 SHA-512

This specification supports cryptosuites based on both the Universal RDF Dataset Canonicalization Algorithm [RDF-CANON], rdfc and JSON Canonicalization Scheme [RFC8785], jcs. When the RDF Dataset Canonicalization Algorithm [RDF-CANON] is used with the 3.1.2 Proof Configuration and 3.1.3 Transformation algorithms the cryptographic hashing function that is passed to the algorithm MUST be from Table 3 appropriate for the claimed security of the signature scheme.

Implementations SHOULD fetch and cache verification method information as early as possible when adding or verifying proofs. Parameters passed to functions in this section use information from the verification method — such as the public key size — to determine function parameters — such as the cryptographic hashing algorithm.

When the RDF Dataset Canonicalization Algorithm [RDF-CANON] is used, implementations of that algorithm will detect dataset poisoning by default, and abort processing upon detection.

3.1 Common Algorithms

3.1.1 Hashing

The following algorithm specifies how to cryptographically hash a transformed data document and proof configuration into cryptographic hash data that is ready to be provided as input to the algorithms for proof serialization and proof verification of each of the respective cryptosuites.

The required inputs to this algorithm are a transformed data document (transformedDocument), canonical proof configuration (canonicalProofConfig), and hash name (hashName). A single hash data value represented as a series of bytes is produced as output.

  1. If hashName is SHA-256, let transformedDocumentHash be the result of applying the SHA-256 (SHA-2 with 256-bit output) cryptographic hashing algorithm [RFC6234] to the respective transformedDocument. Respective transformedDocumentHash will be exactly 32 bytes in size.
  2. If hashName is SHA-384, let transformedDocumentHash be the result of applying the SHA-384 (SHA-2 with 384-bit output) cryptographic hashing algorithm [RFC6234] to the respective transformedDocument. Respective transformedDocumentHash will be exactly 48 bytes in size.
  3. If hashName is SHA-512, let transformedDocumentHash be the result of applying the SHA-512 (SHA-2 with 512-bit output) cryptographic hashing algorithm [RFC6234] to the respective transformedDocument. Respective transformedDocumentHash will be exactly 64 bytes in size.
  4. If hashName is SHA-256, let proofConfigHash be the result of applying the SHA-256 (SHA-2 with 256-bit output) cryptographic hashing algorithm [RFC6234] to the canonicalProofConfig. Respective proofConfigHash will be exactly 32 bytes in size.
  5. If hashName is SHA-384, let proofConfigHash be the result of applying the SHA-384 (SHA-2 with 384-bit output) cryptographic hashing algorithm [RFC6234] to the canonicalProofConfig. Respective proofConfigHash will be exactly 48 bytes in size.
  6. If hashName is SHA-512, let proofConfigHash be the result of applying the SHA-512 (SHA-2 with 512-bit output) cryptographic hashing algorithm [RFC6234] to the canonicalProofConfig. Respective proofConfigHash will be exactly 64 bytes in size.
  7. Let hashData be the result of joining proofConfigHash (the first hash) with transformedDocumentHash (the second hash).
  8. Return hashData as the hash data.

3.1.2 Proof Configuration

The following algorithm specifies how to generate a proof configuration from a set of proof options that is used as input to the proof hashing algorithm.

The required inputs to this algorithm are proof options (options), a cryptosuite identifier (cryptosuite), the canonicalization scheme (canonScheme) and hash name (hashName). The proof options MUST contain a type identifier for the cryptographic suite (type) and MUST contain the cryptosuite identifier (cryptosuite). A proof configuration object is produced as output.

  1. Let proofConfig be a clone of the options object.
  2. If proofConfig.type is not set to DataIntegrityProof, proofConfig.cryptosuite is not set to the cryptosuite, or both, an INVALID_PROOF_CONFIGURATION error MUST be raised.
  3. If proofConfig.created is set to a value that is not a valid [XMLSCHEMA11-2] datetime, an INVALID_PROOF_DATETIME error MUST be raised.
  4. Set proofConfig.|@context| to unsecuredDocument.|@context|.
  5. If canonScheme is rdfc, let canonicalProofConfig be the result of applying the Universal RDF Dataset Canonicalization Algorithm [RDF-CANON] to the proofConfig, with hashing parameter set to hashName.
  6. If canonScheme is jcs, let canonicalProofConfig be the result of applying the JSON Canonicalization Scheme [RFC8785] to the proofConfig.
  7. Return canonicalProofConfig.

3.1.3 Transformation

The following algorithm specifies how to transform an unsecured input document into a transformed document that is ready to be provided as input to the hashing algorithm in Section 3.1.1 Hashing.

Required inputs to this algorithm are an unsecured data document (unsecuredDocument), transformation options (options), a cryptosuite identifier (cryptosuite), the canonicalization scheme (canonScheme) and hash name (hashName). The transformation options MUST contain a type identifier for the cryptographic suite (type) and a cryptosuite identifier (cryptosuite). A transformed data document is produced as output. Whenever this algorithm encodes strings, it MUST use UTF-8 encoding.

  1. If options.type is not set to the string DataIntegrityProof, options.cryptosuite is not set to the cryptosuite value, or both, then a PROOF_TRANSFORMATION_ERROR MUST be raised.
  2. If canonScheme is rdfc, let canonicalDocument be the result of applying the Universal RDF Dataset Canonicalization Algorithm [RDF-CANON] to the unsecuredDocument with hashing parameter set to hashName.
  3. If canonScheme is jcs, let canonicalDocument be the result of applying the JSON Canonicalization Scheme [RFC8785] to the unsecuredDocument.
  4. Set output to the value of canonicalDocument.
  5. Return canonicalDocument as the transformed data document.

3.1.4 Proof Serialization

The following algorithm specifies how to serialize a digital signature from a set of cryptographic hash data. This algorithm is designed to be used in conjunction with the algorithms defined in Section 4: Algorithms of the Data Integrity specification [VC-DATA-INTEGRITY]. Required inputs are cryptographic hash data (hashData), proof options (options), and a signature function (sigFunc). The proof options MUST contain a type identifier for the cryptographic suite (type) and MAY contain a cryptosuite identifier (cryptosuite). A single digital proof value represented as series of bytes is produced as output.

  1. Let privateKeyBytes be the result of retrieving the private key bytes (or a signing interface enabling the use of the private key bytes) associated with the verification method identified by the options.verificationMethod value.
  2. Let proofBytes be the result of applying the sigFunc, with hashData as the data to be signed using the private key specified by privateKeyBytes. proofBytes will have a length as indicated by the cryptosuite.
  3. Return proofBytes as the digital proof.

3.1.5 Proof Verification

The following algorithm specifies how to verify a digital signature from a set of cryptographic hash data. This algorithm is designed to be used in conjunction with the algorithms defined in Section 4: Algorithms of the Data Integrity [VC-DATA-INTEGRITY] specification. Required inputs are cryptographic hash data (hashData), a digital signature (proofBytes), proof options (options), and a verification function (verifyFunc). A verification result represented as a boolean value is produced as output.

  1. Let publicKeyBytes be the result of retrieving the public key bytes associated with the options.verificationMethod value as described in Section 4: Retrieve Verification Method of the Data Integrity specification [VC-DATA-INTEGRITY].
  2. Let verificationResult be the result of applying the verifyFunc, using the public key specified by publicKeyBytes, with hashData as the data to be verified against the proofBytes.
  3. Return verificationResult as the verification result.

3.2 Instantiate Cryptosuite

This algorithm is used to configure a cryptographic suite to be used by the Add Proof and Verify Proof functions in Verifiable Credential Data Integrity 1.0. The algorithm takes an options object (map options) as input and returns a cryptosuite instance (struct cryptosuite).

  1. Initialize cryptosuite to an empty struct.
  2. If options.type does not equal DataIntegrityProof, return cryptosuite.
  3. If options.cryptosuite is mldsa44-rdfc-2024 or mldsa44-jcs-2024 then:
    1. Set cryptosuite.createProof to the algorithm in Section 3.3.1 Create Proof (ML-DSA).
    2. Set cryptosuite.verifyProof to the algorithm in Section 3.3.2 Verify Proof (ML-DSA).
  4. If options.cryptosuite is slhdsa128-rdfc-2024 or slhdsa128-jcs-2024 then:
    1. Set cryptosuite.createProof to the algorithm in Section 3.4.1 Create Proof (SLH-DSA).
    2. Set cryptosuite.verifyProof to the algorithm in Section 3.4.2 Verify Proof (SLH-DSA).
  5. If options.cryptosuite is falcon512-rdfc-2024 or falcon512-jcs-2024 then:
    1. Set cryptosuite.createProof to the algorithm in Section 3.5.1 Create Proof (FALCON).
    2. Set cryptosuite.verifyProof to the algorithm in Section 3.5.2 Verify Proof (FALCON).
  6. If options.cryptosuite is sqisign1-rdfc-2024 or sqisign1-jcs-2024 then:
    1. Set cryptosuite.createProof to the algorithm in Section 3.6.1 Create Proof (SQIsign).
    2. Set cryptosuite.verifyProof to the algorithm in Section 3.6.2 Verify Proof (SQIsign).
  7. Return cryptosuite.

3.3 ML-DSA Cryptosuites

The Module-Lattice-Based Digital Signature Standard defined in Module-Lattice-Based Digital Signature Standard [FIPS-204] defines parameter sets for three different claimed security strengths. The claimed security strengths, private key, public key, and signature sizes are summarized in Table 4.

Table 4 ML-DSA Signatures Summary, all sizes in bytes.
Name Security Private Key Public Key Signature
ML-DSA-44 Category 2 2560 1312 2420
ML-DSA-65 Category 3 4032 1952 3309
ML-DSA-87 Category 5 4896 2592 4627

Supporting both the Universal RDF Dataset Canonicalization Algorithm [RDF-CANON], "rdfc", the JSON Canonicalization Scheme [RFC8785], "jcs", and a maximum security category of 2, leads to the family of ML-DSA cryptosuites given in Table 5.

Table 5 Supported ML-DSA Cryptosuites.
Name Canonalization Signature/Verification Hash
mldsa44-rdfc-2024 RDFC ML-DSA-44 SHA-256
mldsa44-jcs-2024 JCS ML-DSA-44 SHA-256

3.3.1 Create Proof (ML-DSA)

The following algorithm specifies how to create a data integrity proof given an unsecured data document and an ML-DSA cryptosuite chosen from Table 5. The choice of cryptosuite sets the values of canonScheme, hashName, sigFunc, and verifyFunc per Table 5, which are used in the algorithm below. Additional required inputs are an unsecured data document (map unsecuredDocument), and a set of proof options (map options). A data integrity proof (map), or an error, is produced as output.

  1. Let proof be a clone of the proof options, options.
  2. Let proofConfig be the result of running the algorithm in Section 3.1.2 Proof Configuration with options, the cypherSuiteName, canonScheme, and hashName passed as parameters.
  3. Let transformedData be the result of running the algorithm in Section 3.1.3 Transformation with unsecuredDocument, options, the cypherSuiteName, canonScheme, and hashName passed as parameters.
  4. Let hashData be the result of running the algorithm in Section 3.1.1 Hashing with transformedData, proofConfig, and hashName passed as a parameters.
  5. Let proofBytes be the result of running the algorithm in Section 3.1.4 Proof Serialization with hashData, options, and sigFunc passed as parameters.
  6. Let proof.proofValue be a base64-url-encoded Multibase encoding of the proofBytes.
  7. Return proof as the data integrity proof.

3.3.2 Verify Proof (ML-DSA)

The following algorithm specifies how to verify a data integrity proof given an secured data document. Required inputs are an secured data document (map securedDocument). This algorithm returns a verification result, which is a struct whose items are:

verified
true or false
verifiedDocument
Null, if verified is false; otherwise, an unsecured data document
  1. Let unsecuredDocument be a copy of securedDocument with the proof value removed.
  2. Let proofOptions be a copy of securedDocument.proof with proofValue removed.
  3. Set cryptosuiteName to securedDocument.proof.cryptosuite, which must be one of those listed in Table 5. From cryptosuiteName, set the values of canonScheme, hashName, and verifyFunc, as found in Table 5.
  4. Let proofBytes be the Multibase decoded base64-url value in securedDocument.proof.proofValue.
  5. Let transformedData be the result of running the algorithm in Section 3.1.3 Transformation with unsecuredDocument, and cypherSuiteName, canonScheme, and hashName proofOptions passed as parameters.
  6. Let proofConfig be the result of running the algorithm in Section 3.1.2 Proof Configuration with options, cypherSuiteName, canonScheme, and hashName passed as parameters.
  7. Let hashData be the result of running the algorithm in Section 3.1.1 Hashing with transformedData, proofConfig, and hashName passed as a parameters.
  8. Let verified be the result of running the algorithm in Section 3.1.5 Proof Verification with hashData, proofBytes, proofConfig, and verifyFunc as parameters.
  9. Return a verification result with items:
    verified
    verified
    verifiedDocument
    unsecuredDocument if verified is true, otherwise Null

3.4 SLH-DSA Cryptosuites

The Stateless Hash-Based Digital Signature Standard defined in Stateless Hash-Based Digital Signature Standard [FIPS-205] defines parameter sets for three different claimed security strengths, optimized for size or speed, and a specified hash function family. This specification considers a subset of these parameter sets, optimized for smaller size, and based on the SHA2 hash function family, as shown in Table 6.

Table 6 SLH-DSA Signatures Summary, all sizes in bytes.
Name Security Private Key Public Key Signature
SLH-DSA-SHA2-128s Category 1 64 32 7856
SLH-DSA-SHA2-192s Category 3 96 48 16224
SLH-DSA-SHA2-256s Category 5 128 64 29792

Supporting both Universal RDF Dataset Canonicalization Algorithm [RDF-CANON], "rdfc", JSON Canonicalization Scheme [RFC8785], "jcs", and a maximum security category of 1, leads to the family of ML-DSA cryptosuites given in Table 7.

Table 7 Supported SLH-DSA Cryptosuites.
Name Canonizalization Signature/Verification Hash
slhdsa128-rdfc-2024 RDFC SLH-DSA-SHA2-128s SHA-256
slhdsa128-jcs-2024 JCS SLH-DSA-SHA2-128s SHA-256

3.4.1 Create Proof (SLH-DSA)

The following algorithm specifies how to create a data integrity proof given an unsecured data document and an SLH-DSA cryptosuite chosen from Table 7. The choice of cryptosuite sets the values of canonScheme, hashName, sigFunc, and verifyFunc as found in Table 7, for use in the algorithm below. Additional required inputs are an unsecured data document (map unsecuredDocument), and a set of proof options (map options). A data integrity proof (map), or an error, is produced as output.

  1. Let proof be a clone of the proof options, options.
  2. Let proofConfig be the result of running the algorithm in Section 3.1.2 Proof Configuration with options, the cypherSuiteName, canonScheme, and hashName passed as parameters.
  3. Let transformedData be the result of running the algorithm in Section 3.1.3 Transformation with unsecuredDocument, options, cypherSuiteName, canonScheme, and hashName passed as parameters.
  4. Let hashData be the result of running the algorithm in Section 3.1.1 Hashing with transformedData, proofConfig, and hashName passed as a parameters.
  5. Let proofBytes be the result of running the algorithm in Section 3.1.4 Proof Serialization with hashData, options, and sigFunc passed as parameters.
  6. Let proof.proofValue be a base64-url-encoded Multibase encoding of the proofBytes.
  7. Return proof as the data integrity proof.

3.4.2 Verify Proof (SLH-DSA)

The following algorithm specifies how to verify a data integrity proof given an secured data document. Required inputs are an secured data document (map securedDocument). This algorithm returns a verification result, which is a struct whose items are:

verified
true or false
verifiedDocument
Null, if verified is false; otherwise, an unsecured data document
  1. Let unsecuredDocument be a copy of securedDocument with the proof value removed.
  2. Let proofOptions be a copy of securedDocument.proof with proofValue removed.
  3. Set cryptosuiteName to securedDocument.proof.cypnersuite, it must be one of those listed in Table 7. From cryptosuiteName set the values of canonScheme, hashName, and verifyFunc per Table 7.
  4. Let proofBytes be the Multibase base64-url-decoded decoding of securedDocument.proof.proofValue.
  5. Let transformedData be the result of running the algorithm in Section 3.1.3 Transformation with unsecuredDocument, proofOptions, cypherSuiteName, canonScheme, and hashName passed as parameters.
  6. Let proofConfig be the result of running the algorithm in Section 3.1.2 Proof Configuration with options cypherSuiteName, canonScheme, and hashName passed as parameters.
  7. Let hashData be the result of running the algorithm in Section 3.1.1 Hashing with transformedData, proofConfig and hashName passed as a parameters.
  8. Let verified be the result of running the algorithm in Section 3.1.5 Proof Verification algorithm with hashData, proofBytes, proofConfig, and verifyFunc as parameters.
  9. Return a verification result with items:
    verified
    verified
    verifiedDocument
    unsecuredDocument if verified is true, otherwise Null

3.5 FALCON Cryptosuites

Editor's note

The [FALCON] signature algorithm is undergoing standardization by NIST. The information presented here is based on the Post-Quantum Cryptography Round 3 Submission information. This section will be updated when the NIST specification is issued.

[FALCON] is a lattice-based signature scheme. It stands for the following acronym: FAst Fourier Lattice-based COmpact signatures over NTRU. FALCON defines parameter sets for two different claimed security strengths. The claimed security strengths, private key, public key, and signature sizes are summarized in Table 8.

Table 8 FALCON Signatures Summary, all sizes in bytes.
Name Security Private Key Public Key Signature
FALCON-512 Category 1 1281 897 666
FALCON-1024 Category 5 2305 1793 1280
Editor's note

Private key size information from openquantumsafe.org.

Supporting both the Universal RDF Dataset Canonicalization Algorithm [RDF-CANON], "rdfc", the JSON Canonicalization Scheme [RFC8785], "jcs", and a maximum security category of 1, leads to the family of FALCON cryptosuites given in Table 9.

Table 9 Supported FALCON Cryptosuites.
Name Canonalization Signature/Verification Hash
falcon512-rdfc-2024 RDFC FALCON-512 SHA-256
falcon512-jcs-2024 JCS FALCON-512 SHA-256

3.5.1 Create Proof (FALCON)

The following algorithm specifies how to create a data integrity proof given an unsecured data document and a FALCON cryptosuite chosen from Table 9. The choice of cryptosuite sets the values of canonScheme, hashName, sigFunc, and verifyFunc per Table 9, which are used in the algorithm below. Additional required inputs are an unsecured data document (map unsecuredDocument), and a set of proof options (map options). A data integrity proof (map), or an error, is produced as output.

  1. Let proof be a clone of the proof options, options.
  2. Let proofConfig be the result of running the algorithm in Section 3.1.2 Proof Configuration with options, the cypherSuiteName, canonScheme, and hashName passed as parameters.
  3. Let transformedData be the result of running the algorithm in Section 3.1.3 Transformation with unsecuredDocument, options, the cypherSuiteName, canonScheme, and hashName passed as parameters.
  4. Let hashData be the result of running the algorithm in Section 3.1.1 Hashing with transformedData, proofConfig, and hashName passed as a parameters.
  5. Let proofBytes be the result of running the algorithm in Section 3.1.4 Proof Serialization with hashData, options, and sigFunc passed as parameters.
  6. Let proof.proofValue be a base64-url-encoded Multibase encoding of the proofBytes.
  7. Return proof as the data integrity proof.

3.5.2 Verify Proof (FALCON)

The following algorithm specifies how to verify a data integrity proof given an secured data document. Required inputs are an secured data document (map securedDocument). This algorithm returns a verification result, which is a struct whose items are:

verified
true or false
verifiedDocument
Null, if verified is false; otherwise, an unsecured data document
  1. Let unsecuredDocument be a copy of securedDocument with the proof value removed.
  2. Let proofOptions be a copy of securedDocument.proof with proofValue removed.
  3. Set cryptosuiteName to securedDocument.proof.cryptosuite, which must be one of those listed in Table 9. From cryptosuiteName, set the values of canonScheme, hashName, and verifyFunc, as found in Table 9.
  4. Let proofBytes be the Multibase decoded base64-url value in securedDocument.proof.proofValue.
  5. Let transformedData be the result of running the algorithm in Section 3.1.3 Transformation with unsecuredDocument, and cypherSuiteName, canonScheme, and hashName proofOptions passed as parameters.
  6. Let proofConfig be the result of running the algorithm in Section 3.1.2 Proof Configuration with options, cypherSuiteName, canonScheme, and hashName passed as parameters.
  7. Let hashData be the result of running the algorithm in Section 3.1.1 Hashing with transformedData, proofConfig, and hashName passed as a parameters.
  8. Let verified be the result of running the algorithm in Section 3.1.5 Proof Verification with hashData, proofBytes, proofConfig, and verifyFunc as parameters.
  9. Return a verification result with items:
    verified
    verified
    verifiedDocument
    unsecuredDocument if verified is true, otherwise Null

3.6 SQIsign Cryptosuites

Editor's note

The SQIsign signature algorithm has been submitted to NIST. SQIsign aims for very compact key and signature sizes. The information presented here is based on specification v2.01, 2025-07-07. This section will be updated as appropriate.

SQIsign relies on the hardness of a computational problem from number theory: computing the endomorphism ring of a supersingular elliptic curve, the endomorphism ring problem. SQIsign defines parameter sets for three different claimed security strengths. The claimed security strengths, private key, public key, and signature sizes are summarized in Table 10.

Table 10 SQIsign Signatures Summary, all sizes in bytes.
Name Security Private Key Public Key Signature
SQIsign-I Category 1 353 65 148
SQIsign-III Category 3 529 97 224
SQIsign-V Category 5 701 129 292

Supporting both the Universal RDF Dataset Canonicalization Algorithm [RDF-CANON], "rdfc", the JSON Canonicalization Scheme [RFC8785], "jcs", and a maximum security category of 1, leads to the family of SQIsign cryptosuites given in Table 11.

Table 11 Supported SQIsign Cryptosuites.
Name Canonalization Signature/Verification Hash
sqisign1-rdfc-2024 RDFC SQIsign-I SHA-256
sqisign1-jcs-2024 JCS SQIsign-I SHA-256

3.6.1 Create Proof (SQIsign)

The following algorithm specifies how to create a data integrity proof given an unsecured data document and a SQIsign cryptosuite chosen from Table 11. The choice of cryptosuite sets the values of canonScheme, hashName, sigFunc, and verifyFunc per Table 11, which are used in the algorithm below. Additional required inputs are an unsecured data document (map unsecuredDocument), and a set of proof options (map options). A data integrity proof (map), or an error, is produced as output.

  1. Let proof be a clone of the proof options, options.
  2. Let proofConfig be the result of running the algorithm in Section 3.1.2 Proof Configuration with options, the cypherSuiteName, canonScheme, and hashName passed as parameters.
  3. Let transformedData be the result of running the algorithm in Section 3.1.3 Transformation with unsecuredDocument, options, the cypherSuiteName, canonScheme, and hashName passed as parameters.
  4. Let hashData be the result of running the algorithm in Section 3.1.1 Hashing with transformedData, proofConfig, and hashName passed as a parameters.
  5. Let proofBytes be the result of running the algorithm in Section 3.1.4 Proof Serialization with hashData, options, and sigFunc passed as parameters.
  6. Let proof.proofValue be a base64-url-encoded Multibase encoding of the proofBytes.
  7. Return proof as the data integrity proof.

3.6.2 Verify Proof (SQIsign)

The following algorithm specifies how to verify a data integrity proof given an secured data document. Required inputs are an secured data document (map securedDocument). This algorithm returns a verification result, which is a struct whose items are:

verified
true or false
verifiedDocument
Null, if verified is false; otherwise, an unsecured data document
  1. Let unsecuredDocument be a copy of securedDocument with the proof value removed.
  2. Let proofOptions be a copy of securedDocument.proof with proofValue removed.
  3. Set cryptosuiteName to securedDocument.proof.cryptosuite, which must be one of those listed in Table 11. From cryptosuiteName, set the values of canonScheme, hashName, and verifyFunc, as found in Table 11.
  4. Let proofBytes be the Multibase decoded base64-url value in securedDocument.proof.proofValue.
  5. Let transformedData be the result of running the algorithm in Section 3.1.3 Transformation with unsecuredDocument, and cypherSuiteName, canonScheme, and hashName proofOptions passed as parameters.
  6. Let proofConfig be the result of running the algorithm in Section 3.1.2 Proof Configuration with options, cypherSuiteName, canonScheme, and hashName passed as parameters.
  7. Let hashData be the result of running the algorithm in Section 3.1.1 Hashing with transformedData, proofConfig, and hashName passed as a parameters.
  8. Let verified be the result of running the algorithm in Section 3.1.5 Proof Verification with hashData, proofBytes, proofConfig, and verifyFunc as parameters.
  9. Return a verification result with items:
    verified
    verified
    verifiedDocument
    unsecuredDocument if verified is true, otherwise Null

4. Security Considerations

This section is non-normative.

Before reading this section, readers are urged to familiarize themselves with general security advice provided in the Security Considerations section of the Data Integrity specification.

The following section describes security considerations that developers implementing this specification should be aware of in order to create secure software or protocols based on verifiable credentials signed using the cryptosuites defined here.

4.1 Signature Security Properties

All signature suites in this specification are designed to satisfy either existential unforgeability under chosen-message attacks (EUF-CMA) or strong unforgeability under chosen message attacks (SUF-CMA) or both as defined below.

EUF-CMA (existential unforgeability under chosen message attacks) is usually the minimal security property required of a signature scheme. It guarantees that any efficient adversary who has the public key p k of the signer and received an arbitrary number of signatures on messages of its choice (in an adaptive manner): { m i , σ i } i = 1 N , cannot output a valid signature σ for a new message m { m i } i = 1 N (except with negligible probability). If the attacker outputs a valid signature on a new message: ( m , σ ) , it is called an existential forgery.

SUF-CMA (strong unforgeability under chosen message attacks) is a stronger notion than EUF-CMA. It guarantees that for any efficient adversary who has the public key p k of the signer and received an arbitrary number of signatures on messages of its choice: { m i , σ i } i = 1 N , it cannot output a new valid signature pair ( m , σ ) , such that ( m , σ ) { m i , σ i } i = 1 N (except with negligible probability). Strong unforgeability implies that an adversary not only cannot sign new messages, but also cannot find a new signature on an old message. See [Provable_Ed25519] for a real world attack that would have been circumvented with SUF-CMA security over EUF-CMA security.

Besides EUF-CMA and SUF-CMA there are additional properties a digital signature scheme can possess that may be essential for overall software or protocol security depending on the application. These are discussed in [BUFF], which is also referenced by [FIPS-204] and [FIPS-205]. These additional properties are defined in [BUFF] as: exclusive ownership, message-bound signatures, and non re-signability.

Exclusive Ownership (EO): the property that a signature only verifies under a single public key. Without this property a system could be vunerable to an attack that allows constructing another key pair under which a given signature verifies, but never breaks the EUF-CMA property. Such an attack is documented in both [BUFF] and in [Provable_Ed25519] where it is called a "key substitution attack".

Message-Bound Signatures (MBS): the property that a signature is only valid for a unique message. This property is key for data integrity and all signature schemes chosen here currently support it. From [BUFF]: "A possible cause can be the presence of weak keys that verify multiple or even all messages. The absence of this property can lead to problems in protocols that depend on uniqueness properties in the presence of adversarially chosen keys."

Non Re-signability (NR): meaning that one cannot produce a signature under another key given a signature for some unknown message m, i.e., that an adversary cannot produce a legitimate signature verifying under its public key for a message it does not know. See [BUFF] for an example of a system that could be vulnerable without this property.

In Table 12 we summarize the known security properties of the signature schemes in this specification.

Table 12 Security Properties of Signature Schemes.
Name EUF-CMA SUF-CMA EO MBS NR
ML-DSA Yes Yes Yes Yes Yes
SLH-DSA Yes No Unknown Yes Unknown
FALCON* Yes No No Yes No
SQIsign Yes No Yes Yes Yes
Note

Note*: This is based on the "third round FALCON" currently used hear and according to [BUFF] will be updated when FIPS-206 is released.

5. Privacy Considerations

Before reading this section, readers are urged to familiarize themselves with general privacy advice provided in the Privacy Considerations section of the Data Integrity specification.

The following section describes privacy considerations that developers implementing this specification should be aware of in order to avoid violating privacy assumptions.

5.1 Selective and Unlinkable Disclosure

The cryptographic suites described in this specification do not support selective disclosure or unlinkable disclosure. If selective disclosure is a desired feature, readers might find the Data Integrity ECDSA Cryptosuites v1.0 specification useful. If unlinkable disclosure is of interest, the Data Integrity BBS Cryptosuites v1.0 specification provides an unlinkable digital signature mechanism.

Editor's note

A relatively efficient selective, but not unlinkable, disclosure mechanism can be created by combining the selective disclosure functions defined in Data Integrity ECDSA Cryptosuites v1.0 with the "salted hash" approach of SD-JWT, if there is sufficient interest.

A. Test Vectors

This section is non-normative.

A.1 Test Vector Common Inputs

Inputs used in two or more test vectors are given in this section. They include the unsigned document, general proof options, and cryptographic keys.

A.1.1 Unsecured Data Document

The common unsecured data document used for generating all test vectors that require this input is given below.

Example 1: Unsigned Document
{
    "@context": [
      "https://www.w3.org/ns/credentials/v2",
      "https://w3id.org/citizenship/v4rc1"
    ],
    "type": [
      "VerifiableCredential",
      "EmploymentAuthorizationDocumentCredential"
    ],
    "issuer": {
      "id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
      "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
    },
    "credentialSubject": {
      "type": [
        "Person",
        "EmployablePerson"
      ],
      "givenName": "JOHN",
      "additionalName": "JACOB",
      "familyName": "SMITH",
      "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
      "gender": "Male",
      "residentSince": "2015-01-01",
      "birthCountry": "Bahamas",
      "birthDate": "1999-07-17",
      "employmentAuthorizationDocument": {
        "type": "EmploymentAuthorizationDocument",
        "identifier": "83627465",
        "lprCategory": "C09",
        "lprNumber": "999-999-999"
      }
    },
    "name": "Employment Authorization Document",
    "description": "Example Employment Authorization Document.",
    "validFrom": "2019-12-03T00:00:00Z",
    "validUntil": "2029-12-03T00:00:00Z"
  }

A.1.2 Proof Options

A general template for the proof options used by test vectors that require this input is given below.

Example 2: Proof Options (general)
{
   "type": "DataIntegrityProof",
   "cryptosuite": "Crytosuite name to be specified here",
   "created": "2023-02-24T23:36:38Z",
   "verificationMethod": "did:key value for issuer public key here",
   "proofPurpose": "assertionMethod"
}

For each specific test case the cryptosuite and verificationMethod fields need to be set. For example, for the slhdsa128-rdfc-2024 cryptosuite using the appropriate public key information from section A.1.3 Example Cryptographic Keys the specific proof options is given below.

Example 3: Proof Options (slhdsa128-rdfc-2024 example)
{
  "type": "DataIntegrityProof",
  "cryptosuite": "slhdsa128-rdfc-2024",
  "created": "2023-02-24T23:36:38Z",
  "verificationMethod": "did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw",
  "proofPurpose": "assertionMethod"
}

A.1.3 Example Cryptographic Keys

Cryptographic keys for used to generate output for specific signature suites are given below. This includes public and private (secret) keys in hexadeximal format and the public key as a publicKeyMultibase.

Example 4: Private and Public keys for ML-DSA-44
{
  "mldsa44": {
    "publicKeyHex": "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",
    "secretKeyHex": "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",
    "publicKeyMultibase": "ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL"
  }
}
Example 5: Private and Public keys for SLH-DSA-SHA2-128s
{
  "slh128s": {
    "publicKeyHex": "4834a55ff26a17f3947a265bc421093a629d2e863381f8f9f6d64f707cf2e95b",
    "secretKeyHex": "765d610794caa0dd67472ed92b8ec0b23c1d57c8ed25a9147be7dcd5dca241fb4834a55ff26a17f3947a265bc421093a629d2e863381f8f9f6d64f707cf2e95b",
    "publicKeyMultibase": "uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw"
  }
}
Example 6: Private and Public keys for FALCON-512
{
  "falcon512": {
    "publicKeyHex": "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",
    "secretKeyHex": "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",
    "publicKeyMultibase": "urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k"
  }
}
Example 7: Private and Public keys for SQIsign-I
{
  "sqisign1": {
    "publicKeyHex": "e144bdf2447d65170073bf86c3e2d241fe9c6aaae3065c1d7f4a3d0f3ce10303dd99e0b81dec4f85bca1fe5ecfa12ed2f8c2f5bc58bd751b7b1431d8640ca8030b",
    "secretKeyHex": "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",
    "publicKeyMultibase": "uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw"
  }
}

A.2 Common Algorithms: Proof Configuration

The Proof Configuration algorithm output is dependent on the specific proof options as well as the parameters, hence an output test vector for Proof Configuration is given for each supported cryptosuite.

A.2.1 Proof Configuration (rdfc, sha-256)

Example 8: Proof Configuration mldsa44-rdfc-2024
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> .
_:c14n0 <https://w3id.org/security#cryptosuite> "mldsa44-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> .
_:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> .
_:c14n0 <https://w3id.org/security#verificationMethod> <did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL> .
Example 9: Proof Configuration slhdsa128-rdfc-2024
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> .
_:c14n0 <https://w3id.org/security#cryptosuite> "slhdsa128-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> .
_:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> .
_:c14n0 <https://w3id.org/security#verificationMethod> <did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw> .
Example 10: Proof Configuration falcon512-rdfc-2024
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> .
_:c14n0 <https://w3id.org/security#cryptosuite> "falcon512-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> .
_:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> .
_:c14n0 <https://w3id.org/security#verificationMethod> <did:key:urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k> .
Example 11: Proof Configuration sqisign1-rdfc-2024
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> .
_:c14n0 <https://w3id.org/security#cryptosuite> "sqisign1-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> .
_:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> .
_:c14n0 <https://w3id.org/security#verificationMethod> <did:key:uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw> .

A.2.2 Proof Configuration (jcs)

Example 12: Proof Configuration mldsa44-jcs-2024
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"created":"2023-02-24T23:36:38Z","cryptosuite":"mldsa44-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL"}
Example 13: Proof Configuration slhdsa128-jcs-2024
{"@context":["https://www.w3.org/ns/credentials/v2","https://www.w3.org/ns/credentials/examples/v2"],"created":"2023-02-24T23:36:38Z","cryptosuite":"slhdsa128-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw"}
Example 14: Proof Configuration falcon512-jcs-2024
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"created":"2023-02-24T23:36:38Z","cryptosuite":"falcon512-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k"}
Example 15: Proof Configuration sqisign1-jcs-2024
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"created":"2023-02-24T23:36:38Z","cryptosuite":"sqisign1-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw"}

A.3 Common Algorithms: Transform

In addition to the common unsecured data document the Transform algorithm takes parameters canonScheme and hashName. Only in the case of canonScheme equal to rdfc does the hashName parameter matter. This is reflected in the set of Transformation output test vectors given below.

A.3.1 Transform (rdfc, sha-256)

Example 16: Transform RDFC, SHA-256
<did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg==> .
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocumentCredential> .
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://www.w3.org/2018/credentials#VerifiableCredential> .
_:c14n0 <https://schema.org/description> "Example Employment Authorization Document." .
_:c14n0 <https://schema.org/name> "Employment Authorization Document" .
_:c14n0 <https://www.w3.org/2018/credentials#credentialSubject> _:c14n1 .
_:c14n0 <https://www.w3.org/2018/credentials#issuer> <did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> .
_:c14n0 <https://www.w3.org/2018/credentials#validFrom> "2019-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n0 <https://www.w3.org/2018/credentials#validUntil> "2029-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://schema.org/Person> .
_:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmployablePerson> .
_:c14n1 <https://schema.org/additionalName> "JACOB" .
_:c14n1 <https://schema.org/birthDate> "1999-07-17"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n1 <https://schema.org/familyName> "SMITH" .
_:c14n1 <https://schema.org/gender> "Male" .
_:c14n1 <https://schema.org/givenName> "JOHN" .
_:c14n1 <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==> .
_:c14n1 <https://w3id.org/citizenship#birthCountry> "Bahamas" .
_:c14n1 <https://w3id.org/citizenship#employmentAuthorizationDocument> _:c14n2 .
_:c14n1 <https://w3id.org/citizenship#residentSince> "2015-01-01"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocument> .
_:c14n2 <https://schema.org/identifier> "83627465" .
_:c14n2 <https://w3id.org/citizenship#lprCategory> "C09" .
_:c14n2 <https://w3id.org/citizenship#lprNumber> "999-999-999" .

A.3.2 Transform (rdfc, sha-384)

Example 17: Transform RDFC, SHA-384
<did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg==> .
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocument> .
_:c14n0 <https://schema.org/identifier> "83627465" .
_:c14n0 <https://w3id.org/citizenship#lprCategory> "C09" .
_:c14n0 <https://w3id.org/citizenship#lprNumber> "999-999-999" .
_:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://schema.org/Person> .
_:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmployablePerson> .
_:c14n1 <https://schema.org/additionalName> "JACOB" .
_:c14n1 <https://schema.org/birthDate> "1999-07-17"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n1 <https://schema.org/familyName> "SMITH" .
_:c14n1 <https://schema.org/gender> "Male" .
_:c14n1 <https://schema.org/givenName> "JOHN" .
_:c14n1 <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==> .
_:c14n1 <https://w3id.org/citizenship#birthCountry> "Bahamas" .
_:c14n1 <https://w3id.org/citizenship#employmentAuthorizationDocument> _:c14n0 .
_:c14n1 <https://w3id.org/citizenship#residentSince> "2015-01-01"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocumentCredential> .
_:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://www.w3.org/2018/credentials#VerifiableCredential> .
_:c14n2 <https://schema.org/description> "Example Employment Authorization Document." .
_:c14n2 <https://schema.org/name> "Employment Authorization Document" .
_:c14n2 <https://www.w3.org/2018/credentials#credentialSubject> _:c14n1 .
_:c14n2 <https://www.w3.org/2018/credentials#issuer> <did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> .
_:c14n2 <https://www.w3.org/2018/credentials#validFrom> "2019-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n2 <https://www.w3.org/2018/credentials#validUntil> "2029-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .

A.3.3 Transform (rdfc, sha-512)

Example 18: Transform RDFC, SHA-512
<did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg==> .
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocument> .
_:c14n0 <https://schema.org/identifier> "83627465" .
_:c14n0 <https://w3id.org/citizenship#lprCategory> "C09" .
_:c14n0 <https://w3id.org/citizenship#lprNumber> "999-999-999" .
_:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocumentCredential> .
_:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://www.w3.org/2018/credentials#VerifiableCredential> .
_:c14n1 <https://schema.org/description> "Example Employment Authorization Document." .
_:c14n1 <https://schema.org/name> "Employment Authorization Document" .
_:c14n1 <https://www.w3.org/2018/credentials#credentialSubject> _:c14n2 .
_:c14n1 <https://www.w3.org/2018/credentials#issuer> <did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> .
_:c14n1 <https://www.w3.org/2018/credentials#validFrom> "2019-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n1 <https://www.w3.org/2018/credentials#validUntil> "2029-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://schema.org/Person> .
_:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmployablePerson> .
_:c14n2 <https://schema.org/additionalName> "JACOB" .
_:c14n2 <https://schema.org/birthDate> "1999-07-17"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
_:c14n2 <https://schema.org/familyName> "SMITH" .
_:c14n2 <https://schema.org/gender> "Male" .
_:c14n2 <https://schema.org/givenName> "JOHN" .
_:c14n2 <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==> .
_:c14n2 <https://w3id.org/citizenship#birthCountry> "Bahamas" .
_:c14n2 <https://w3id.org/citizenship#employmentAuthorizationDocument> _:c14n0 .
_:c14n2 <https://w3id.org/citizenship#residentSince> "2015-01-01"^^<http://www.w3.org/2001/XMLSchema#dateTime> .

A.3.4 Transform (jcs)

Example 19: Transform JCS
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"credentialSubject":{"additionalName":"JACOB","birthCountry":"Bahamas","birthDate":"1999-07-17","employmentAuthorizationDocument":{"identifier":"83627465","lprCategory":"C09","lprNumber":"999-999-999","type":"EmploymentAuthorizationDocument"},"familyName":"SMITH","gender":"Male","givenName":"JOHN","image":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==","residentSince":"2015-01-01","type":["Person","EmployablePerson"]},"description":"Example Employment Authorization Document.","issuer":{"id":"did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76","image":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="},"name":"Employment Authorization Document","type":["VerifiableCredential","EmploymentAuthorizationDocumentCredential"],"validFrom":"2019-12-03T00:00:00Z","validUntil":"2029-12-03T00:00:00Z"}

A.4 Common Algorithms: Hashing

The Hashing algorithm takes as inputs the results of the Proof Configuration and Transformation algorithms. Since the Proof Configuration algorithm output is cryptosuite specific the Hashing algorithm output is given for each cryptosuite test case. The Hashing output for each cryptosuite test case is given in hexadecimal format below.

Note

The first half of the hexadecimal Hashing result is the hash of the output of the Proof Configuration algorithm, while the second half of the hexidecimal value is the hash of the output from the Transformation algorithm and both can be useful information when debugging.

Example 20: Hashing (combined)
{
  "mldsa44-rdfc-2024": "fa074359f280ed66bd74b65c8f644175b2f413e24ef3b917d557b3bc261b28f203f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
  "mldsa44-jcs-2024": "1f49de8352bfcdef9457b14be9f4375c7288fb914cf1c974eab20f3d145b011a6ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc",
  "slhdsa128-rdfc-2024": "26c114126bfe7aa69e33fe6c66150d816134726e71e3b1ab7f991a132f2b6ef803f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
  "slhdsa128-jcs-2024": "7cc816b810b96de7a90e38d1ff5bb1666476e1f53a16ea7e14a8447fa5ac34566ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc",
  "falcon512-rdfc-2024": "588886466ce3de13a82dfb8bad0d7ee27b94f80a73c50f2d7741126c71d143e303f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
  "falcon512-jcs-2024": "ba0ab0c5e9a26cfe5aa89a59b4ae53a3f4b6bdf3307769d21fef7f2dc11864be6ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc",
  "sqisign1-rdfc-2024": "f35e179a21495698798ec6f982353e16bea9d14374ab9b659cd0afebcb1417c903f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
  "sqisign1-jcs-2024": "4c1d4ef51ede749b051fb4b471e7da7d3c37af030fdd66323922fc89ef4a7dfa6ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc"
}

A.5 Create Proof

The Create Proof algorithm output is cryptosuite specific and uses the outputs of the Proof Configuration, Transformation, Hashing, and Proof Serialization algorithms. The output for each cryptosuite test case is given below.

Note

The output of the Proof Serialization common algorithm is not given separately since it is contained in the proofValue attribute in the following examples and can be quite lengthy for some quantum safe signature algorithms.

A.5.1 Cryptosuite mldsa44-rdfc-2024

Example 21: Signed credential `mldsa44-rdfc-2024`
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3id.org/citizenship/v4rc1"
  ],
  "type": [
    "VerifiableCredential",
    "EmploymentAuthorizationDocumentCredential"
  ],
  "issuer": {
    "id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
  },
  "credentialSubject": {
    "type": [
      "Person",
      "EmployablePerson"
    ],
    "givenName": "JOHN",
    "additionalName": "JACOB",
    "familyName": "SMITH",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
    "gender": "Male",
    "residentSince": "2015-01-01",
    "birthCountry": "Bahamas",
    "birthDate": "1999-07-17",
    "employmentAuthorizationDocument": {
      "type": "EmploymentAuthorizationDocument",
      "identifier": "83627465",
      "lprCategory": "C09",
      "lprNumber": "999-999-999"
    }
  },
  "name": "Employment Authorization Document",
  "description": "Example Employment Authorization Document.",
  "validFrom": "2019-12-03T00:00:00Z",
  "validUntil": "2029-12-03T00:00:00Z",
  "proof": {
    "type": "DataIntegrityProof",
    "cryptosuite": "mldsa44-rdfc-2024",
    "created": "2023-02-24T23:36:38Z",
    "verificationMethod": "did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL",
    "proofPurpose": "assertionMethod",
    "proofValue": "u_LfmjHGGR1q1D2_Ue-KKAwdZpSirCp8NGDu6EDN3DzRKUAlz_pl_JNlzd3Pg4dNAUCGc-avNt1ZQr4y5P_h6C3tP_HTaNIfVIx1O-D9Ooy59PgjHZLWAWiMiVx2hfPiLg88dVAMqpp1gjuiL8XRYiGLDQONRCoRXjTd-fZ6cg81p-NZ8ISINOjWJfWkf62avqWVp0yTBM2jPaNIkbfHCoUpwdwSj_NhXJMd10qag_hF_Hob_Abjuz-eAmg76AkSP0R-8l7peBmqfwP7TcSKPGBT_FUGjwbEkse2136YiNdYlk-NALtyz1PRk85tXood34_RTqCiHpa465ey2cJQ7Ve8zYQvU00u1SLF49ahIZfFGbiXpbVWHHCmvIGuqIxwq6hkRT_f-5T8SHOWmRUutnk7l5bvK2BqSBB2vd2yJexEe1j_wH-Nd5TYmqFq5Zg42zxpd7abSPqcNkkTZUPeOsrghrFT-glm0xr2uWAoTGn6FYye-_YM58hV2JE295a2PPg1wJcvN1AEnhwANGL_SlM6r2r0g5wesPY0cBMNJpXenI4_iY5EjINGZcjlShAGFGqx37hyPElHaYUortI_5s-PwyWGSJeHJ8IJBNO_M0okoy1yF6DefSbdDghWOnRWUYvzJMiwvM8TkxSABlIJ5oevyiZR5cHVpKgvaNYsIxzkK2bUVPJ_E_GpIHEpGnlS5Y3yji_SdoG5mufkj3D_PLY71qzs3k8SfN7KRtXp5nwwjw1khyHpqN-sRbV1gu31-NcWVR35x_a8zzxEcV5i1Q6hzpp9Gi_VgfOxJZIeuOc8G3uDEmjnIlhFfHgnCIwRJ2TQZs90nahcrYyNUdy7PMtmRKBiVIBYC57fA3kndbzHfzM2Ed12Mv75MnSK1Io55nfk8jTdxKCynrEZRtGhxLlQ9eoA1zO66haknhc95FVJZh5e0tjew4EQprlhdpBR4t0fJChAAqgrJNQ9ov17Nt5Ly6N8gGzgImzI1qN2mClYHX7ow4yzAeetZW_5WEaLyn57f0Tf1kcz9AS3TJNEOHgfAs7ZXfDNCFLgR5Bb0XWhL_2IP6rbeChcB9WQEQX36kGjIJfnUx0B2OSGNUF0Vjj3Zkr6IP37MATawid9pbYtytcY5KC9pn71KhzBqA5c6xJ4mdFXDZIbA9qEPfDsUao4GYPoVeV-0YXVXe7nlUmFp4WTCxoePGZbJcRWtHTegpVgtKvynhmIdHa_CYP_M_KKaeAhiufFCc7JYmyj6rdwz-xipAiAIHsdgrgtRgEdH_jrhFKEPP7gC9S8tK6NCpEWpzXaRnBkQTAQyt0IMMyyGHAgoHx_3wFQynT-7IeKb5si_i7penySiP7QQigJ6SB1nC7m0aLDWvcZ-X3A03BMqlYTgE8EWvJHtjmsjJSoOulD_WN_mLhXIIkI8mhX6-1GggQBg3JkqyRr1i-hdnpjE7iCgQnaS6Gk8O0gU8i_EoQh97275vaf-NwaXun-p3X_0U3cwTzsGGD-EIJu-zUwSThIUa4nKyImm-yrWh-r8tnQ4_o4gl8Avsw4Y4YQ8v9d3U0nr3E_xw0vKWMLxenn2xYGxo-wy-7W-9S8-SnjqyUxeDI1IwRzHYWHjP6_NK88jzpVTP90ySiIg_pAPxff7-xU-xtIgc_41bH1mjIVL_lK0sTS9F6acxGY7J0ijPMglCD72QUUx-J0OdESpxOhx3o4jc2thRhYzLPmZ9mXEMHwMf87Td-pdwBFFI8ff4eOozn7nZbih27UL-w2Xv4fHbBkAi0njje7JDkl5DyuyCkR86aVv1yTFemiq3rY8oHhCUIiUq3HyqCA5wD0mx43RDH00bTEQb2hPQ6CEKrgzpSp39fS6hsZBGCFXkPxsQAGOkRlnTPkIdg-pl1sVz4CNcpDcOBZ9ZNFBSSw7Nc4DUefLTD2n6nCswhQJL2wBbPJt24M5ckBD_0_CH7WwprAJKHgrJS1NY7X5iDaBl_8GvIW73xKsYBL9ZdUbuvp6ALAuQD9lsrXlzGZ0VbO7ap4484dr_v4zxteh82ksGbZZ3ujCqmIU9lqTtR5ahX9GGsLfIqczWyZbczYS9xU3ow7rG5muPDuZ9EVScvEkTbnP8Dw2238YKTuZIIALDShMYUqwPjnUpORlLg_MyRodiaVR6PdXbYSAeRchLXPNiwifsjvHbLnTeFeVGjshluYEpB9FdxJRAJpPMTsa0-t06q0e4FZXU9fs9lOwz0HpbJEa774XUTrM1XtqyAh2yKHhtTCQ6_PduO9PJE-OkLx12W2nc_ql7IW7BGyylwee-RaSVKmg26G_0ozVx--pBa-HZpcgNIleI3CY1TwMzZsT49QNMJ0hmsnr5mumiX8eRmmo_GeT6fKY3AxSnc0Y6yrTmT5MP0wSz3jssXplN6UkzahDPUww_zN2Tc10Kf9ehHrqCGrZho9r5Eq1o6_yXgdNogbiEl_VltIVsujdwoUHNSOzZJ2lKYsB2X0o6G6nSvXjWJr9F3DBivxsDERQTWOyGB3t_0ogmCGnwelnB9k-mz90TwbQ_2K2xd7Eoe6rfSJDTDt25u9dSI9TGvDow7fmglua7obkDlXz8JzQCfNhPqAO2Mv9TqqGywbDqwucJDgfFRhf6Rp7LTRUHQmQeLZCu1wfCCkBHs2SEIyj53AvNP1qtoLon60AQ5jP0sW1XTZHsi6xS0W_6qZq5UXFHNoERFOdkb1Ry1F4ScixWxHvXMn4SkRfQMga7ejtK2AO2ofJc-oun6IkE_qiNnu35JXJjvANMhgPwmoHme75e_bFvmHQn0JY2Fg1DrrvXWgE1S2uDJwtXJ3pi8SlRUfzEJR634Zw4jZWxxSYc96J1PO45jpA67l2PDbIxrqKZhkx17zy1ASfdSnlRLYcbqaTfPqPb1IuXm31cA56IQijOM8YNFbEfe9u5ysx4q-QyiluT91ZcCMtDOyR8pXUBR8UTSFkMNVrvE7erdosWSZM22SHF7LYlSK4-L9pybOndjM81gE_2yRtWgNkmEhTP9wGqBa_MfDxSa7iTUBr9joSn6SgCUyfufT1ZRlnIF0FU_qYYWWL9jdbV4k9v6aetHY5sgS-2fgJRGvy8bKD6M55TfMxQrI3XGCf6RAZGlNnf47T6g0SFx8hJi1EVFljcIuQo7PGBoS7vfUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAUOHyQ"
  }
}

A.5.2 Cryptosuite mldsa44-jcs-2024

Example 22: Signed credential `mldsa44-jcs-2024`
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3id.org/citizenship/v4rc1"
  ],
  "type": [
    "VerifiableCredential",
    "EmploymentAuthorizationDocumentCredential"
  ],
  "issuer": {
    "id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
  },
  "credentialSubject": {
    "type": [
      "Person",
      "EmployablePerson"
    ],
    "givenName": "JOHN",
    "additionalName": "JACOB",
    "familyName": "SMITH",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
    "gender": "Male",
    "residentSince": "2015-01-01",
    "birthCountry": "Bahamas",
    "birthDate": "1999-07-17",
    "employmentAuthorizationDocument": {
      "type": "EmploymentAuthorizationDocument",
      "identifier": "83627465",
      "lprCategory": "C09",
      "lprNumber": "999-999-999"
    }
  },
  "name": "Employment Authorization Document",
  "description": "Example Employment Authorization Document.",
  "validFrom": "2019-12-03T00:00:00Z",
  "validUntil": "2029-12-03T00:00:00Z",
  "proof": {
    "type": "DataIntegrityProof",
    "cryptosuite": "mldsa44-jcs-2024",
    "created": "2023-02-24T23:36:38Z",
    "verificationMethod": "did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL",
    "proofPurpose": "assertionMethod",
    "proofValue": "uTSucVLvXmOpmjGGNB-B9rM-u4HzBxN8ZIuZbpTHrjOTNBnahoE4PSdkeD-IzLLXykJn0aYq_APExy-Ka0BcJNMvKgkdjbbP33WmUwkzljno3szRUDrN9KX2DMH7j0iOBakU4ByjD-hTSO1iR6rlxsZPHJM1H-WLMhzVSggBILAuglItzstl663Gz5bFjEfbKAgfe50L4v4PjLFSDbJYcg65GtCKRXISkWrnJRuToWwvTVdcnIBOQwPBFKsvApPJMKrUTkIuZf4-V1uJ81zzct4o20O-DqLQ5bHfOR2n5Y4DSy6e5zg0-S3ADKtMtuPaQ8cAPUTEKRXGRQnSndnrtgMh2dimvpSaaw0TDy7zY6vrDxJa1tkrS0ulKf3Xz8xsNrNIkx4SaKYWPTjhRvdKqjdrpbGRt3mRSFFc0VE8vK44F_EVFIhwouL-4Rm4mXU2QkiO0YkwuAJM-QdWUACqzJ7TSf2QrrU8zAwOLbrGS5uZ1qLGD1PcgWfg2d0zTAYmcWP4LP63fTnFxwr-L0N_3MLFXixHNEp5osMlo2lhl5noDCmQpqCgluxkd5gXs1NSpOBbWVQyYWcj0WMBtMam8AeqXpA39L7oqvYxqbEpiwvKrmHsXIEZrnsHKCk2P0yc10AFCCtsIapvTHwIAjbDhX11HFU5cci4X5vCdG2BUzRsgmGeiYiUClCHmqsBW4z2GA9r0d9jtHZ03nMie_qS95XPsXuAFqypsP1HOfcIUAHHS9Wn4XGFz3hXoqMsmoUGRg9vEpC2j_nkcYZQphYLs54veWq5BBzoMqPuvYhhRdawdCnn-LTf7AxQgVGoRTpTy4IkXxr_pC1LUJZJkdKeG-2TuQzyHSkbMPu3YbWsGy2KxdGeFN2yUI8TTQ-MFHl-_jDCRBrAYyCVOgML4NAtbGqvs7h2tGZYI-m9MfjG0vjp7CUyIPD8BV-Yhku_bHd0hcrseKtYYyUjxISf2wveo4dfQ2AnCVdDAbBmznjPIDlkqx0316sRc-vXJGRQmfXOW1dNk-7WNBrJVQbnT9m6cf0UEl3mEgagk1_lLOxTgjzZRpWcOB827VB3hPi7RdI6U6knXuOflHPt9BZN7i6OAl76k69uMFH2KNH3Abm0GDhOv_nu1lEaOH8aXdOqL3U8Yo0cp5roOoTw5fJP2gxwI3DY0TOWeNOCfLXmnodgoGaKG2Vns4_-gN_Mg7g0ZinguwJMwKACx07H__ffh8jYQdc87EjCNyH4m8hJICvcC81J7CKb89YTZm7IM0D1_qTR5t-DkuU4ypxNuFOCxWpN9y2QiLAAobDdc1Y_S3nXFFkLmsn7hUNhcgXxPC3jLifiM0IV7DAqmQpk2ZGE59l0VTKb3F2Ualj9JcqKtLg_b2KqprUol9WtjFlkbxqJPYyCKnSEitzDnDsfxTRFEIViTx5-1SFb0NjPE_hv5MewCkizNpfo0b-m-FxvyWJnDYt4Igv8JtgF0K_xMRC9Tf3NaQgFHb1OgkBz04C3wsxoPLqTgMWoxcZ2-2x7TRRvX2Nh1Ye-ZrpmF5hVeRMK0ECj_t5HLPaq2md18rqnhwsZv84-V0eReDyXVIhkE2eAKedCM9t13UjTfF1qFoUQ3D8xQ6MfR7zFwf6X78Tb0EFs0cBQ1TatzWysbE2b_0k-YbT78G4Ko8FlmTljBN1b0StKxzOE1Kp1h4nDBY9jZYYPNnVrtAGn2AKN3HWr0bhhF8fW_G4SA_MGu2r6LnobB3MLCSj1lbVZSk5YtCtMnkldAsDagoI8lRBlKW1R7PFvXatSHcwbe352nVuvZYxs9QJVSylf2QS1xeUQUMS4AHd4h8Y9HqmnGPr5JX65uch8sr1bWcpGiNlwnMlFy89pnEZU2v7IiC_foLi8JbxMud1k2XRDwThhepEf5bxqlBcgjF8vAbGEKAJg5Oahl0GCBffuHhuUXmuF6XwOxLovlJUM8oFCTayQL42NGz_Z2cuFltmiy-cbI8NmEpvlOPnGZBj00ZIrp9tAgwepYvlt5ticFn9ufU-f8xZpBpZb-rf5sVTNqYmoOYvhKVhE5cCPpCbzZ5GvW5ukB8yLLJC5sc6df9oSoujovfA_VAXqsvmBuKU4cHcNTNEqzsGEg_l0ln5FIHKH3CRUTDemKN2vbtmTz1snn4VfdBFAlhJhBItpBmd3HibH-1q2WD313j-cE5nW_QgQeDn_JFJ7zwlORQVRUkeB942HJjkHWXCJMXz9LKxdncKalaVNm-yVjDkQdgA1tKl9bc_QnAL7HWhtHFc_XhzJvQxqLJ0aLUkkrnphrqscG6D_Kdh7aTTkDjDSA-dmgRQBh51YVBnfnp5V28AwmGXXglBAWCWChGmAtac6xeLbxW143426J4HMAUIpLgNhjetQoQqKzVTIpzcyo-GK8L3C0calt57orTswSRqDjxg_6zAQ6RPNoThToRqb2QgHr-gOop6NEJkEy0K8GwPg3nYAFgVVjcCyDtMEbIrHXJ9WKg3oTd14eC7GNZgQ75aP3HpUAqT5gqWdxer35Ohs3n1FylwreS1kOZ5Z4OVW5PVJkNHhKPfaNq4mQT5vBAWlWphOotPHwTbN7oMiOGYu-AMTnsLPCn0A3VEXx16EROpu0zlVisEZo1sya8nQaJYiI_i3MEWqvV2ypvcMDYt_ArFjxMU3tjV5tNcJgIoE5E5UCGyo2HQMvN03T0GdHZr7txswg9HpRJqntiJzm0iAr9BhRPfErg4HLQyc92gOH6UdczP4hvbweP3mcW67yUT3lH31vznZ5lIJ0pth3H_7khwUff5daIROar2usWxoMWTItY5HC7v5HBjnfqj4EoVi1A4Uw7RvHhaCMkfDrqqntNM0TDDSfDP1uCB1RwZtcuWpNfLWYyP1B9XqwKg3EworHhIq1vI74gZROvebyYqx8UCFeiLubTfXHJrC2evT99ha6jf7vg8zKgew6Cj3Jz_RSRE5rF5uQQno6PsevbKKtZsQmn0PQphfNzWqacMpred2yrmetGOEG_JvYxx5Scmu8w8Yg-3V7yhMeDsOh0DZ8sjTw5d-w3zKUNeU2IZzz5wvaJ7-8RRxyJqxFsUFaBv7WxUZ0bmWg4pRXdBUKNW53mEUGDigpRF6Fla-6wc4BCDhwfJWdpaixu8Lf4fkRKCs0Y4-lrsTH1-zwNkKBudbd6v4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwbKDA"
  }
}

A.5.3 Cryptosuite slhdsa128-rdfc-2024

Example 23: Signed credential `slhdsa128-rdfc-2024`
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3id.org/citizenship/v4rc1"
  ],
  "type": [
    "VerifiableCredential",
    "EmploymentAuthorizationDocumentCredential"
  ],
  "issuer": {
    "id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
  },
  "credentialSubject": {
    "type": [
      "Person",
      "EmployablePerson"
    ],
    "givenName": "JOHN",
    "additionalName": "JACOB",
    "familyName": "SMITH",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
    "gender": "Male",
    "residentSince": "2015-01-01",
    "birthCountry": "Bahamas",
    "birthDate": "1999-07-17",
    "employmentAuthorizationDocument": {
      "type": "EmploymentAuthorizationDocument",
      "identifier": "83627465",
      "lprCategory": "C09",
      "lprNumber": "999-999-999"
    }
  },
  "name": "Employment Authorization Document",
  "description": "Example Employment Authorization Document.",
  "validFrom": "2019-12-03T00:00:00Z",
  "validUntil": "2029-12-03T00:00:00Z",
  "proof": {
    "type": "DataIntegrityProof",
    "cryptosuite": "slhdsa128-rdfc-2024",
    "created": "2023-02-24T23:36:38Z",
    "verificationMethod": "did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw",
    "proofPurpose": "assertionMethod",
    "proofValue": "uqJPI9rTSZFuAXX9ib8DRWyqMHYB9UDLcPjtsvPg2F8YXSdxikxgpxgwM5WlJhw1Flwo5cbg-k489IM2iYoUjWlmwIp9lSAjbdm4eSd5yFiG8YVUhAdtql0AzFk4EYfJb6pQQlDQJ6m4ECkTd1oG1mxzdSZWXL910p6bwXjWWPZ-2LtuH26vR40u3tFeM1y1GIdtsqOiCgchAaDGGe12f_q-1d60yZwiyTEjC4O5lsCJ_P4ahN0DUQ_v2MObEYOCTGaG2zRaqkNIcbXXhjh31mMI8fb3S1LSyV3aMwiAmE9UdbcTA-O5JIsJf2bNZR_c3ehKzPvGNwLXdi3ufyTVcrazXRxVHJbC5PUnikvzHNUjdTGEc83i_BMbog71V8sKDmhgD4hflBm2nGDm8K91MtsrrWUWSU_oeUuPNkrvtN8V-ElAcW2TQUaazIlNazLISgR183cUmQn724i9icbflpgcKlfZ3nH8RYO2u0UZHnNUFNRQkuOEz7R2y9klpmKr-bVMl3Z8eaBOqIcQaBM_M-uDMqP4uP7B2EDdbXX1ukc9O2fIXrK4GykvCI88URhqA1hMZnV4K3dBlpCgiU4XU9wYJNSeghfo4-D1gJFoU7GienDgmq6lP-qn1HnWKwnb652aufVD8pL2aM-GTg4pUJfZNUGCOiKijtAQSo38arskxv9IC3NGo74ATzRsM6ZIpLU9s9KB2wCa8LHbVy1ZAIrSf8S_dH7IsfXkrc_pHjePTR-xatlH0kRLLWTbDFawRhlUFelI-TmLEmZm_ERNMxwBbCuHV4IuPDeFfTRhN1UDaFkN05PrVtLC-q4Yb8qrLH8S18My64SJa1mf0lobAglpwK--p9XTkNJdfSMU30i-djVWkd7Zar0clsJQP9SVPTYsH7WztqLqnmWL4YgmVKJ753fUeG3DdL-4ZcsD8o-1S7PGFbnnRvJwpcCF8nlKMSnpOqlZGq8eeuZyQ6PSxJ_WO2kW-Xp15Rvryn_VVCocNTQkjoo0e88xQEvqCE8dtrWvSY-ngK6qQ9dqLpZUCwWA4cXwlPJYRzOPBee2PMOkaQJPAAXIdHhAd096MK9-aDdquyTpoxc2EatT_Iy39KoxATxFxOseZah-D36VTTxwtEU4HO0LBUN_ddSO5R55BmOA70LkEaExSLxB4DhZfdQXhoMjKkTtG2YIoSEPX959du7yXsRyIDwp2Gdy3SdoxTDyP-VLaiEyC5hVut9rwBZRhnhETRZ1awX8Y9TobnkZs_qRTRtd8HftybqUrIebvABPhpmzEdeE2eBKP8PsM6u4UCBRw0p6d2t9xPODQjcEbOle_nSKPJHlGVl9xdg8CDjvRJoc2o7cDKtCeGPs_Y6jLnnQqPXAbRHayy517upEauA0LiCRTcAv6kYSMjcEPLn67wEfc3fti-EgBIG4q00F-rMdFb3mhRMB1ZnMNwddaxMeXabbwTxjaxCA7mArg0U3goldqJO8pHzy-ObnlDXArDlTx8YMyAWvB0c6WY7F9GIs4VckbOLoNMF0yVR5LDAJsL1LpROUVsM7fHQAI2jTh-6KVwFSEcXY0EnG0Isnr34npSeD0hXxc09SdfUzgl8XWHaILQmuI_OWq3m60uIKjvtzXkU56mKQKRgR5ARmEj_65iApDoQgpEe0JfSaqQJGnz2eCF1RHU-ZbsLl5G5oBayATl5CC77uKqpH2NnX5wqBsDV7UV6qgC__oRG7ykTogOw_ojqQ0pEUUaWAI-f1E1GpGF2zyZ7A4MxUghFvVW2rsoC6X01et5IBM6nwkCgk03J_uUurAKJUCeKCOoZJ_tLW_cV_aQLSII0SRUSqLY2k0AEMFjXI6gfY4-aV-pQmefmdOjXyiRZyS8LU_EHo52NMxsePzbstZ2TKFMOHZpQpW_H-Y-PWgr6mkQYH5436fztJuBhSqMF0SWYAECdjF7hOzyAAIHkkyDhhSYJhpPxftPHSxlE4tPalBk8jQvg6mXVrCGMW1gM2w04qfKAy4bwuQxWdHVG2hjaR8JBAIgEA5uLhUCI05QSCuzYvqc5-oEshwSiQiHeHupjCSViMN_Ri-2G8AbFkFekNKtUx0cryVMSsTSKq8XIn5NxngQfhNbHRmwhUmiqNeaVmqZ4KiXgXXzpFJibD-DdLfOKuH1E2cLPklQ1UUNozNDDA__YWvODGy8gRR7emCLxpVuaKP3XTUQZTATXtwCpdongbIWTf8MQ9FhaRssbYHc45F9UPMSzUGlIvyNUiiTypC8-gVQRDNeHkhhg6aG3huWvtso4m9RmiO1Yzma6ff5ib21eJAMJh-kjds-WEoQpKMcvSXXanvrKXPylvXkx4irUSezXkxM5SzxguPNRXz7m5XHIYi7TgZArXL09eE-zMl5Zdi3unvq4Uj8If512aeGWHtWUwQ-cHQX85FFizf7aQJy2vcBZjEXSvbEApSgB5uSy99dWNghZeK2zsH6xU6r1JYksxqTySl4HuM5T-HwpZsUI27WrJ9ztso1RNDXP6m6BcShtSJm1r9BoLrogLqANijcWdjuCre0cbzTmEGJ41igw3EQae_wvweWWhxM06IGOaj9WTU7rDykmF0oR-HV8w1ACi8xRgyOVy0_nREaVVln1BZZJqSHpPuMBuJjMMDvuY9AU-9e5aCRpYiHTpTT_k4c7T34DrUgyzA4K8nlmrjDbdgEtDDnqq0UB6rPEVUTZ3PD5efdPWd6lCMQtlXlDFURFpM7htw3RqNPI1MjQGDfir6_qTY-MRD9XiEFv-ec6S7PXj2RW9s9f8mmERaX_BDCJasRPBoQ0lGzaGgovCU20rf4YAjejw2ldw7x0cJINJQ5mx8RZqNyLyytYbioZLgXqtBm266P51cIpEb1_dwAdacTfhoHPohC2BJcHnQosLKTkqq1JlCHhcbpg5YP1mFjjs-jdqFJLGD69zD2ubDE-ImduGJqg6iWU1bSwoDa5yQgMZAT5GtXjOxhEUUdLFd-Rvuxe9OA-O_XiSSXH5A3sy5lxtTCuO1Gm9mR9gbxxwlkT3TsKkQTDUNPnk_KjptNk4NNiyjNMxrQ6E6YiX2xLNPTVr37kTb-BtGgo39FzrHczOQsYa-jlENcGk4SyfItIgVHfzemv0v4VtGVIRC5rVn8MuwRVI-tZLPVAwxMgFIv0O6D6rrndmIlWZq_4oh_CwmoNMsHbR6yOdoBhSa_7ig2lLOriru9sAia6-dU3eMNj4b0yD7Gf0NGJ2lQmaBozk3kHwv_9bQLxRclbgT-BzBtlKQeV0cj9zZTmbqUJG0CGqQg7chsbVa8gJnTqNEefdEdpX_lsmqAiqxDkcgShURhkPM3ctuVxau3Mgz2GKDuCQdzOZQsJqOUyio09IlGimX7ojkB_RVpSYPPZAyC6G7mP2rGrZDYk-GXy5o2LlG8zHoBYLEOzmvAsUDGbR-PQG5yDcQ6nGnmrozYKH2PLLKGI0Ur9ucuSy6BQm2QX51f_ng9yl3D8cXQfOD_E5pO85zs3I_r8KbZZU2Izq7dTlF-Vk71ne4kPA7bJsX9RulW93xEsRDoilCVtgqJB6R9_1kwk79jlcNaY2SvNjaGq49zaDjyhoeBupVkWV8uHtwJa-m8dv8-sWZmRZFGM-n1Cwt-gR6sTfvxtnezDntSwqpj8uUsG1eECsrIRI5Wjq_a0vcHUK2_R-Mm8EiYchgrgSBPVwzbae-yw_1Mvq1kcTynS_DmTcaqS3JLWypx9LjzgInn2be_9t96HLk7Gy9KWiNyxVV3dJaS1vwRLA8ff2r4Oy_xCdkAiXpssE-LUV_vU_zqpdEaJ6Cs8b9eCN6rjc_xhXf8bganch6jqCZCb-8cOr9vNYFzxeDODAvER4wGTvS1lmT3FZf5TcITyKpBeIwwK00ZwEj9n47-mS3zeAkc3C5wvuKaphaDoCmUDBBiP8LWku_oOnPygYAxNtHjrno0NKlcE2WVcqTSZ_V8B-YNl-PKjZfT1TnJ67nfo0cplsZL610ErqH2ws_3GPlEdQKie4I4-e_uYLoodHI3Uzt8D67WzwLePTFFFhLlzWBfbWo_t9UvcHgjZ00VMrwpSxzAMKgQYI2U-P9Rq_36aXabzWsiXUXxWFxDUMm_-sE_VfyHUNjfJpF6v2ejnYj2Fph5JoXh1OYNmvACjciqNWJKtSa8KoNAflBUqHOANh6F0mFLbB43thhGv0q-mo2sRJ8ecihZM1kyS_vLf0gDSu9o-vHW64vD0ueVZwPqnGOL7_jtMhb5hCt5kfvzr4w18KtyF6rxDn2YT1dYAVQ-hMfreFWTLWDu8-hCD40Ykmrg0bl4ls6Dtzoxtf79f9c64jiOA6n3OsVp0jfNCY7m5D6iXVHUW6qHsZDmMyqskc1QraJ-b9nkVLaf9UTAzWRnakW_HTLH_YTG64Lnr8jeFR8b2NGypI5XVUID-WYRQCw-2Ft1hywqrAVG3e9WVANPbxrFlhY6MN-jUpNlaKKZYrRdtIvjfa-rCuwfvZbqSk3XX4wfetJq5UPQaSst-yuc_O1EHFgVEPFQxE8UnWrMbcyPsfbGV4oKSzMeSQzUjmyBw98YnmFSo5GMzXcV6i3CpfHpMkpBd1Q-sQ1oZ1ofGwHWWklcPgLiwOoU5AQ4vxtH5EnjyEhOGIX_5yjaulHIBs_PNRzaC3kC89MhJLMFTDWYEh6M5jCqV70zny0EWiMc4l8vMiv72TmgdpQzihP0uUrchLMZIke_3uRQsSubsbcBZ5BL-GYHO7EPQ5w1zBI9UuG6wHQ1ALMryqP2vyz-ta3uiEa78tt_Py2PY9pRZavE9qWXDPWA0fQrSPIgaK1DAgsv2ZTbioVCiYCcPYl528iuKYwnr4ni412xp0gXZXXswVbaDHmtez7_vLizx-L5EDeYh4vVm59FdoZFd1vslv9rL_Kq3-D2-Zfv0U9qi5fEU0ItbGMxf8x_gVmsBKSkMfScc2v3zHi76FwwtighF08j9AFnxCsYwR6wK8l2aawgCSA6HxtSCsEaYcf-SyMTMtKZDchlh4qapaUz8HSLuGw7C_kVktbGgeqggDu-3sRr3nqi8fM_Eijago-B2_Z-cgN4lOKVErgmrKlRMdlP_S5viCxSMxPDOGRwk05deFA8RVEO83ZWkLkFkFAFyNL9z3AEx4AltH60rl_J31eUV_04x3s2GY0X7n3TN1K9rXh3h3MWFEJYxV46vlFG8w91H2vvNAOZTF2a5M8wMBLEyZvaMK72oSRd-J29xD69Ev8nZQOCtpQ73KZ2RiLP_BffF2GGv8ohoojTa_b06seXxlLZXh1331JjuZ-k4FEvyOEFYpQ5yV7fat_l3HDpangVRnL9IL-60c9oYFcUy5GZ83dbolMkd0oAPmIqChJSumwulIRRD3gfIp34KyOjYvoGAHDeiLO0m-LeZOsNv4dyi5KlifW-UXtL_K8chmFuPBeqbHhAS3gdomeI6tER9sHoOHg_iVEfDqlc91Qy0kVTO_yLPtX1wgZsitnl51fFBsoQOW2_OV4xpYXL26-0hzgS2PrOy8n11ccA8DE-T2l84wQ4wgnMs15ezAPGXLdzOMvvSCMOp5qbMNBIjz-FHMfkQVZTfwAjqMxS32dli2MOf-dOmGbV2n6MJcEUMIZ9mGPulpAgrJsR6j4xKPWn-RsRBrbK5cVHzsCPLT_7LqDkVp2YT47TNTaWCBTfH9PoT5huDb1t3uEMtN_iGEB0LoDlCWSI2H_Wkkr8XifcGf2NBYOTHXY7VZI9uNAUvW5U6lniFIxNjiFeccJCG_DPzAY7bO3XgWqtDzaFgDgDmCEf1ZFMXN5Fmu4GWfLv18V__mPvXYFu0NkAjVDVX2te8GZwcgc0SPoju8-RAlntfqFD4YFaoJXJ7Duwa0vAWazNWsSXq2muPQII_JFRVjmqF3zFe2JFZDCbAbiec1g_2zH5XXDFO1S7GVVsrphiec_MFFMA8t2vMzqVT9VLoufXreMq9tvQSA2gN7_MrSreH9bx9F3vpN3nh1wI1jd-RvgaOAbwIF1x6-Re7VVMassV1jqKE3CXyNiW2IjgOYpjbNilvcpAy4p-m3cpV5FGR0tERJSBeV5jeV4J3tWybFEvY_bqY2TsfSq_Poe3UIrr409YwcpLUaPvrqBdYE4eOB5iQG_R2-UvN9Wwt3SLaulG7jp9Xvh5fk2PHLaQ1F_xK1iZghBHRQzORhpTEaT4hTKJRwiMnku052jKM0IhyWsEx3wGYendvHEsJWfN5SGN7o3K2QOpRTGc39A_YcfcLuVYWWmFNhvg-tf-_RxwbPipzf7uyPCNNyZJ_yfkS4VNk-KIpM76nv4BYEdVfx5ngp6H7lbQIK0qE7gQbFamCZQFgQn8uqrA7JFZDZUPo03U0uRZe-weWt0OCsYYoyt4O2y4bItFv865DwQJqDzQQxiailXEP3kO22VR6TqnokBz5GYfigSudSRFsqlJaDUt-JeSBDwQHqnlPTvLU7Bx_PzOde20jAKGk78v7trSDv9rNo_aDYUeu8_PheED5C0dgXx0a6zmkU8aNMZoym5HDm8-7_DZQoWFAniblUGFXcFTn8qpezDEnFTFwtlcrDgHxdREAbfSMvoMoeTwe0U2cJPJFT51EB_RYxJR5qIyTDjp2IgzyyCuwEXh2tRKPdkX5QTZLVcy0rbC4TPQcgqkJogvkjnB-u8D0N5pmGiSf5U4LxUpAgXOI9-ThLQiwrDMxP3KAMZJoJiT2tiLzo34ajMfmviKQZDRy63Eoyvh5m19gJCWXXfOBXepCYEi2U_9aYYBSMTPb_19rn5pCaiK1G8fRzeammBtXr0Aa1bwPLVcNTv1rFbHKbn4S-OklXjd_-8JesA21wtVKbBFsahuoW-oaEyBMDA9vPNhz1cR6lmT1spqTxpgBDckFivTnjY4YTGWpXi9M7nirdVQiS4jUWugCGHLWI15wAJ2vAABqTp4AfolFBdGVauOn1Wc7MqVIZ2TCMRAiDnJvLMdCoXZ1toJwe65-AfK0_YXDoWCDieArF32Ggzs1oDDBQDKvhBy2AZFbJ4hAmvnhouiv1zHyMlUg0xHLxopyKtHnJshHWyB4z38YMCb_ee79ILJmFRA8ftSW7qvkAYst65-su6usGG15hiuLi3GwJ5ZZZoAuKUWtM7XB1_FIIgmDw-q3qUff3Z6YXK28ee1cp7azN66R-b94Z0y6igtRnu80xCThMUCZoDdePamuxf2LeEwB5PUIj-KHZbe7mB09OXyR-DF_SZR80Ncr6rB5f5psQQm6GvBfYnPIw3hfiYbx8a--OzWaqu3_-CZcJrcFrLZR0jN8_tialEEzFX_6ktbUCwtsMhDe6bs8u0G7qHH15NFm87l0ZXWo_BXVGyg_0yFFsEkXKk8kDWfTG0fW3xxg_CXfIYrywTO9BUyTqwdul0s-spSTJ_TXMz5MjwBO67BGNzlikVOTdXnUg6enkaA5F-Gonj-gfEaWh1tByNC5Ud5t-Jb2CJmgeZ1OP-0uWbg7LnoKaJF-gWo3M_Aga7dyUAvCnCn2nZycjYH9ehDQFHwPqeoyQdj40_F7nJH3Gxi0bw9JWVYZrLjHaDVW2exW6Lj7z-UhsklKKflmoii_L7kYNb-cJ8oqNaEXJyXnKmuj5w0ZCowM4xD1QxgUBaFlzxwDQCvR5IiC0oBqachjdx6bXadba2x4zVcXTakVQn-YOmbOkGkTKRC1doa5Sd846piUyC9TSGUEpbgXXgDRHyLenv-o-HLS20fILrp8fFjEJlpdxHIBHA7PQ2NZ55G1IfwvZPL4bgigNWOgJyh-kFS7Sbqtiyi9sZtKq45bJLw4IpUqubHiTvI2fUw13rWk-eTHOVZIHfWlV4WDsuYVJsrt0PgwoaVGt0HWpsTQcUWKkGP-0QmGqP8ghbO33p0awaBl5jDIROAACWOFqeFnAtQWcfEjlgPCEKAAjAMVroW46s5gi1JaeNxmMR9Ax4LA-A-NcgPManukGh6FPEXOrwl3kxca8nJJwQLTvEPIPqeKmg0mSbimkWbsXe_MnqgzCSyqIbksYx_HLGcXKw3sVX6kInw-xTK-UsJn5N-sJAYNrCJPJMoL9GopkF9aDrY1bkijGGFnY4Ube7Ac5Y9p3xVX7CUZ5PPYDQgihuvdVlPMdQvl3RiVft1np5RX6_PJPlFcSs6eCgs4Vj5o1MGwI_KvT7KRpEjnMr2B4_LxkKitCIopcCBjxGAjBQjno_ygJ3dhyQzM8UsWoJZDow_XxFOWKvlzieNGKkIb6SxsMYZHCVqKdO8XYV0LKqfKJTcArd2sA3xzP6FvpzV_L1s-3CRFXwHiOv6_U-ayumxRIt2Z6eQlLgeE0-jxBa9xPeMdw2VXlZtVssxLtX5_4gkZgXNt2Lge7Ev-CnI3uf-39-UdFm98oUrAdT031m8HMIgddwfRHVlAaO2ZmdxxoCGpAZy5XrhZuK9yW-u9kvrL5_wuFNGbiysVJpnB9TtKY7qj-PtAdIQTNi0aAgH14z2L7jEXtJCZfS2hASqyGX7nmh4iyUfnAkKfE7_NThadomJZ0om_W-CW2LMviCwNEHQDjW6dXzndgIJAcQyYy4auLBUFPXhfb3rBpGflatT5KGMYQ9N9_ep6VyFMvNcRBQnI-8JnmfTpQo687dIENkwFRPtia3idrAjOGr6r3m2kaqQu9Ya7GZmtvhX7N3ppIvc-RiLVM0OaBxo-491qRhjECNV_lunCezE5lHA5dtM2ha5NzXWtlz4t1WpeOD5GeWR3URGdYhVL0xuhU-X-9X6m1ilsYkMR7m7M5n2K9ebWW_koHUJ3SvdM0a6u12se3Jv82XTGxrrTamUrOS80y3-1ZWVgHZbyE_4XWrEO3WswJD40aEB1Yy7_WtM8B738RMuTZy8K8jLhRIKmXGMxYqhM-R6mEs-nSqvsKCf0FG8CyQUByqNIx6ITovaFkDGeiK0Se3-kaFzxZS3j0JypZgoOh-3I_4qcHbB_qJmB5P1LcLKBbEeRFG97uQPEBBTD5BwGV3518y0n6wA4H1NL-Y8GngmEKFaQ9ihdKtmZT_2EYI_LH-wge3jtWBrHnR-zkNR-VjtPBiDnBcGcQ38fnywUv3xqjpZ-10GgQ9ZZUqm2_oPa3bVo3Z7mxJq3hmLKnjCjsuzx7zbszNhdt3rmevknkPD601Redsd_7966RhDX44MPP-87KV8RxxjuWdkv7C3Eo46YmlWgxDb-yWwtHd9QWkwgvejSiE4K_CbaIYs9PueevqC1byTVD3JvuMGpuqfRAnsKdWtr2Ux5VL8go5zDEj1PTjjG8IctMoTZ7wTM6GLV84DaEMlr83Shs6NZqbR_fw-oQwIRSEbN0f0Zn-_q67xV0XWNExaYYz5DJm3nq1xpkNr1etEizXCPh2loYjMDHGrJbq3I-VikB3lutUOoe3hP6mZhNQ_PvMXVIXdOFtGhsbyUQKdo0kUssBnAIKikGfVc82Sy6NCRaZSmx-R-PTWfg1OL9H0fhz9Gw-bqPPOcxv21d9BNKdiKWIOBtWGeW6oqqiF0mGFwxcMeZwqjVQTZTzprLEO8akCQP892-1eM302f102bukztpzn-bP1QV9HeLfAeFsrRy5YngxAqQ95Kkmsx71sxoOxbN5d1CMfdMAXeacXU4VJJeezeaVCqDKoI1fmxjorL46yI7sDtQEPr69tNr_p-VMjcB1ZFwI-RnK3iUL9qLsm3bEDHpD0rIZHNl0AdEHABbtQRgT7OK0SPTH7STUIY_Axqd0Lhou2mtVf-CKfYgZ5LUYVjhdiYi4pUfZL_RJHc7DBAhuIgJtWeZTAeCWLOz-cwkTyMdW4UfW7BA7T2vr5P5jlhtr6bx-I9gwP4Q5HzdD21dHuunE1NwSdnpmZqco417zRDWtGhIOyJRkJGOMgSaPXeKrGBfgK9NqE_kWbnlV8Yjz3VFUsPKX0gpZncl0i291hHOcO5lJstb-cW0J-iQiXOKlaR6wzAubyi89t3BQHGZ8kgd5iI4rsDzn6dDkAY9Y-W7ROhGoUwy-3fVEF9iNl90Qzv904GPkepYWkzba7U8rGvb3yTAkfPecfB6ur2lHZlhuhQPry1Gxy2YfacgQWwr5VmhChKaEeccmL_L1mJjSKT3rEPnzisld2D20QBxt6XatRympMGNyqFpWfSfQFvLtlEkVH87TejqUaMGRrbA3b3M5M_fWbuOpXXqvye5DlcB_PG3eIe7lIAt7HSBw7NV6t7z3WqD79r2KycyKngkm3WdiPrEA8zZIPvFIs8sXGhKj33GBpxwgMmdSlD3tydCMgaZ-OqkypCOUG8pMU1P0fcw5nY8ZU-4HkFYsScqz1dM74cAVevDRofWE9NPD1obItClPfOvSJZ2tL791xW3lakktIXS7JYmPQ2ATWTKtuUbIsx2VZdSA3HcHoFEcWXDNgxnVcYSwdNlA-ucc41GVd1nL2QHpi1moIzxYWWE1uA2Eg4PmNJ1XcSc"
  }
}

A.5.4 Cryptosuite slhdsa128-jcs-2024

Example 24: Signed credential `slhdsa128-jcs-2024`
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3id.org/citizenship/v4rc1"
  ],
  "type": [
    "VerifiableCredential",
    "EmploymentAuthorizationDocumentCredential"
  ],
  "issuer": {
    "id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
  },
  "credentialSubject": {
    "type": [
      "Person",
      "EmployablePerson"
    ],
    "givenName": "JOHN",
    "additionalName": "JACOB",
    "familyName": "SMITH",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
    "gender": "Male",
    "residentSince": "2015-01-01",
    "birthCountry": "Bahamas",
    "birthDate": "1999-07-17",
    "employmentAuthorizationDocument": {
      "type": "EmploymentAuthorizationDocument",
      "identifier": "83627465",
      "lprCategory": "C09",
      "lprNumber": "999-999-999"
    }
  },
  "name": "Employment Authorization Document",
  "description": "Example Employment Authorization Document.",
  "validFrom": "2019-12-03T00:00:00Z",
  "validUntil": "2029-12-03T00:00:00Z",
  "proof": {
    "type": "DataIntegrityProof",
    "cryptosuite": "slhdsa128-jcs-2024",
    "created": "2023-02-24T23:36:38Z",
    "verificationMethod": "did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw",
    "proofPurpose": "assertionMethod",
    "proofValue": "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"
  }
}

A.5.5 Cryptosuite falcon512-rdfc-2024

Example 25: Signed credential `falcon512-rdfc-2024`
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3id.org/citizenship/v4rc1"
  ],
  "type": [
    "VerifiableCredential",
    "EmploymentAuthorizationDocumentCredential"
  ],
  "issuer": {
    "id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
  },
  "credentialSubject": {
    "type": [
      "Person",
      "EmployablePerson"
    ],
    "givenName": "JOHN",
    "additionalName": "JACOB",
    "familyName": "SMITH",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
    "gender": "Male",
    "residentSince": "2015-01-01",
    "birthCountry": "Bahamas",
    "birthDate": "1999-07-17",
    "employmentAuthorizationDocument": {
      "type": "EmploymentAuthorizationDocument",
      "identifier": "83627465",
      "lprCategory": "C09",
      "lprNumber": "999-999-999"
    }
  },
  "name": "Employment Authorization Document",
  "description": "Example Employment Authorization Document.",
  "validFrom": "2019-12-03T00:00:00Z",
  "validUntil": "2029-12-03T00:00:00Z",
  "proof": {
    "type": "DataIntegrityProof",
    "cryptosuite": "falcon512-rdfc-2024",
    "created": "2023-02-24T23:36:38Z",
    "verificationMethod": "did:key:urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k",
    "proofPurpose": "assertionMethod",
    "proofValue": "uOaRP1-nFR8VyHyVk7XBNRw9LaVadAR2LUiAvPtrL-oeD8MqMhzOgwyHjJaFjT-8Q16axhq9UE9t2O3hyis_Cpv3g2W5c6h2CJI1KaM-GCDUw3M-x7MMZZkjybtKKE4actl-bM07Q4bTsUSLpUNF74-bVu8qFBRVz0cPX_nzgpF1tj6rIgz2gN3Z84_2szrv6ZE6ryVixTZ78189YM1YkP-lSz-PRdqTuSSXlYlCn8l6JovTX_c38aTxUqMqmie4xfSbIiwqtCRCKLnhdk39lO4qrUzlJ1lKFg4FVXG5lpw7Ml3XavW3jtTZyg-7C2jfQ_nLrJid-Cd0AI96NZzZMjvhnJ81kpXuTDF7lZ8RgTldLYQjUGF2xF6M5u07CuuyZFJnVxa4WD5bZy9I1pGfPfMdyLrw0NaSGnrXJ0eI2alZtfIcRBBYIzWZNKxPfmuIKygkE0GhO4nuGoT-pdD3mrHY0Jccy5zXZHU5OyfjDmiXfDzfnevxr7g2i48N1RnsPSTzxeuzZBee-Bh3Y1EONJ_fh65IypECZq1AUmVPDINMohwZp3JXZSKdnuJqfOaLh5rHXGQ5OOVDGYRT7q_-WxDBnF6_Rh3EwaK7_W1T1qF43LxzAoTYdmVpIatmUg6-HfWAPRmNeYA_Fg21n5PPxZPoqhAbQiRFvDWJPiFJRlQvEkps4qeqIB8ajsda36xOnMfWeHaMJYBz8tsHmi9L9dnpuJRw-39QqU0uBRfifx_txgclejBNZBUQYN1_1sUcW9uZIa0UHiOpAO9z8TkaFWqZ9Zz34a9vW5XuSZ_LVDy283GtVtmia9uoO0euV9xo23E4n_zmU9Sa83LMnisuYZompo0NYVtPhsN_CykPKmsAAAAAAAAAAAAAA"
  }
}

A.5.6 Cryptosuite falcon512-jcs-2024

Example 26: Signed credential `falcon512-jcs-2024`
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3id.org/citizenship/v4rc1"
  ],
  "type": [
    "VerifiableCredential",
    "EmploymentAuthorizationDocumentCredential"
  ],
  "issuer": {
    "id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
  },
  "credentialSubject": {
    "type": [
      "Person",
      "EmployablePerson"
    ],
    "givenName": "JOHN",
    "additionalName": "JACOB",
    "familyName": "SMITH",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
    "gender": "Male",
    "residentSince": "2015-01-01",
    "birthCountry": "Bahamas",
    "birthDate": "1999-07-17",
    "employmentAuthorizationDocument": {
      "type": "EmploymentAuthorizationDocument",
      "identifier": "83627465",
      "lprCategory": "C09",
      "lprNumber": "999-999-999"
    }
  },
  "name": "Employment Authorization Document",
  "description": "Example Employment Authorization Document.",
  "validFrom": "2019-12-03T00:00:00Z",
  "validUntil": "2029-12-03T00:00:00Z",
  "proof": {
    "type": "DataIntegrityProof",
    "cryptosuite": "falcon512-jcs-2024",
    "created": "2023-02-24T23:36:38Z",
    "verificationMethod": "did:key:urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k",
    "proofPurpose": "assertionMethod",
    "proofValue": "uOQsNa2vrNpLO7zr2FtOMZELtKKrlLkihlXOTLzkXam8svZ29h9-XHfqDGW8cWX257d9GlpnxlV1ZjDoI4_R1aXk6jxxWsVSnZJEGy-NiMtZI5UHhwK_dvLGHZj4RfHXvQTKCSzKNcW0t6BM-g2itNcQTUmLVxHV9fhvfl85DtpvtUEoeE9Zh8snDTKHcZ5AGD7hQHAT1x4YbHOTGWdLFm1IFwvRBKulmBisAh-vqujSt86IkvGQyq4OItE1upZtydy7r8ZXhY97_RrXTPJgUum-zLDK8O1HiwiNx5htjBbiJGmv3lXma2XaG95DRrN5SDQCLx1CcmYmRMfqL7TS0v_6MuKDyFiQfGkJJZm4nMTKTBi846HJrpBbXVrFb_ZC0n06v-75nVxi76ATR94JqMJW2c7CeWboU_LEuvbhMNzyoMpUDf0hIdx2tbLop5tOwc3psxTzMbpLu3q7CtNL3D88CODS7uT86DMhKzY_xMYAVLOHXqKnYHGbGshmUal7A6keM2FMoeuc1fHgStter_lxSpZ7nkOxVEEs1smCJCErr0FwlNG47Ased1h28rJo6EdyWYthIM3EyoTkQ3tFa4UnlZzdxYqDvSMLTqCFXRi9p-qdLYr2k-yNiWjdMEM27lv1dlg5wR6NJwjE5BmONxkgYfSOdeVhQOCOgR2VZmuNiQFwBO3cko5lcwRNFClvF2qcDqKzIKrzquZIz4xZaJml8fe57TOoVKmDQluRSdlJlPxygZwwSJUmvIATKv0RjJw-jkJrxFu8n73Cqof_VVU2wOO6e1ii2SRtW_U5ikGXlae39Vmxan2I6LEFwN9pu9V0JcMx7dPkj2vuTvwjMOk_1sIBvnZjVHsjW09JGKTGAAAAAAAAAAAAA"
  }
}

A.5.7 Cryptosuite sqisign1-rdfc-2024

Example 27: Signed credential `sqisign1-rdfc-2024`
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3id.org/citizenship/v4rc1"
  ],
  "type": [
    "VerifiableCredential",
    "EmploymentAuthorizationDocumentCredential"
  ],
  "issuer": {
    "id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
  },
  "credentialSubject": {
    "type": [
      "Person",
      "EmployablePerson"
    ],
    "givenName": "JOHN",
    "additionalName": "JACOB",
    "familyName": "SMITH",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
    "gender": "Male",
    "residentSince": "2015-01-01",
    "birthCountry": "Bahamas",
    "birthDate": "1999-07-17",
    "employmentAuthorizationDocument": {
      "type": "EmploymentAuthorizationDocument",
      "identifier": "83627465",
      "lprCategory": "C09",
      "lprNumber": "999-999-999"
    }
  },
  "name": "Employment Authorization Document",
  "description": "Example Employment Authorization Document.",
  "validFrom": "2019-12-03T00:00:00Z",
  "validUntil": "2029-12-03T00:00:00Z",
  "proof": {
    "type": "DataIntegrityProof",
    "cryptosuite": "sqisign1-rdfc-2024",
    "created": "2023-02-24T23:36:38Z",
    "verificationMethod": "did:key:uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw",
    "proofPurpose": "assertionMethod",
    "proofValue": "u95i_VB8BTjvSCWVS68r0ynhLsxmRRxQ_NNhVq-PfGgMlEWkk2Wiw1dqpNwu3dy0m0fDGrgKtmAHpI-BTH3SyAgAHm2POTk4LZNQxFSgScJc1jhuWKiN5Fb6ntg-5RN-X0v_f9kPcgti85_89Ns7ZU5ul33rcY4HzkiP0vdDSMnuoQsWlzZ6kwQOY-cr8DlzgOAEREQ"
  }
}

A.5.8 Cryptosuite sqisign1-jcs-2024

Example 28: Signed credential `sqisign1-jcs-2024`
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3id.org/citizenship/v4rc1"
  ],
  "type": [
    "VerifiableCredential",
    "EmploymentAuthorizationDocumentCredential"
  ],
  "issuer": {
    "id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
  },
  "credentialSubject": {
    "type": [
      "Person",
      "EmployablePerson"
    ],
    "givenName": "JOHN",
    "additionalName": "JACOB",
    "familyName": "SMITH",
    "image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
    "gender": "Male",
    "residentSince": "2015-01-01",
    "birthCountry": "Bahamas",
    "birthDate": "1999-07-17",
    "employmentAuthorizationDocument": {
      "type": "EmploymentAuthorizationDocument",
      "identifier": "83627465",
      "lprCategory": "C09",
      "lprNumber": "999-999-999"
    }
  },
  "name": "Employment Authorization Document",
  "description": "Example Employment Authorization Document.",
  "validFrom": "2019-12-03T00:00:00Z",
  "validUntil": "2029-12-03T00:00:00Z",
  "proof": {
    "type": "DataIntegrityProof",
    "cryptosuite": "sqisign1-jcs-2024",
    "created": "2023-02-24T23:36:38Z",
    "verificationMethod": "did:key:uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw",
    "proofPurpose": "assertionMethod",
    "proofValue": "uI2_222exFq1NXg8hWMFsENbhQp17XWsPzc8xU0VJIwJY6bIcqOdHmEpmqHRysXP9dPS0ML6ZeeVlT5tNsRyFBAAAGBvscX1D4zKjDbhhFNEuFW0RyKBxRaUoCxzpZzh_Iq-LmCsVLQ8WDQhygTQQTbwWo20zi112MzNTOMU3H6zUZId2q-mRjpZtuzaxjY_QcwELBg"
  }
}

B. Revision History

This section is non-normative.

This section contains the substantive changes that have been made to this specification over time.

Added cryptosuite algorithms for Stateless Hash-Based Signatures, Falcon, and SQISign.

C. References

C.1 Normative references

[CID]
Controlled Identifiers v1.0. Michael Jones; Manu Sporny. W3C. 15 May 2025. W3C Recommendation. URL: https://www.w3.org/TR/cid-1.0/
[FALCON]
Fast-Fourier Lattice-based Compact Signatures over NTRU. URL: https://falcon-sign.info/
[FIPS-204]
Module-Lattice-Based Digital Signature Standard. Federal Information Processing Standards. August 2024. URL: https://csrc.nist.gov/pubs/fips/204/final
[FIPS-205]
Stateless Hash-Based Digital Signature Standard. Federal Information Processing Standards. August 2024. URL: https://csrc.nist.gov/pubs/fips/205/final
[INFRA]
Infra Standard. Anne van Kesteren; Domenic Denicola. WHATWG. Living Standard. URL: https://infra.spec.whatwg.org/
[NIST-SP-800-57-Part-1R6]
Recommendation for Key Management: Part 1r6 ipd -- General. Elaine Barker. National Institute of Standards and Technology. December 2025. URL: https://doi.org/10.6028/NIST.SP.800-57pt1r6.ipd
[RDF-CANON]
RDF Dataset Canonicalization. Gregg Kellogg; Dave Longley; Dan Yamamoto. W3C. 21 May 2024. W3C Recommendation. URL: https://www.w3.org/TR/rdf-canon/
[RFC2119]
Key words for use in RFCs to Indicate Requirement Levels. S. Bradner. IETF. March 1997. Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc2119
[RFC6234]
US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF). D. Eastlake 3rd; T. Hansen. IETF. May 2011. Informational. URL: https://www.rfc-editor.org/rfc/rfc6234
[RFC8174]
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words. B. Leiba. IETF. May 2017. Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc8174
[RFC8785]
JSON Canonicalization Scheme (JCS). A. Rundgren; B. Jordan; S. Erdtman. IETF. June 2020. Informational. URL: https://www.rfc-editor.org/rfc/rfc8785
[VC-DATA-INTEGRITY]
Verifiable Credential Data Integrity 1.0. Ivan Herman; Manu Sporny; Ted Thibodeau Jr; Dave Longley; Greg Bernstein. W3C. 15 May 2025. W3C Recommendation. URL: https://www.w3.org/TR/vc-data-integrity/
[vc-data-model-2.0]
Verifiable Credentials Data Model v2.0. Ivan Herman; Michael Jones; Manu Sporny; Ted Thibodeau Jr; Gabe Cohen. W3C. 15 May 2025. W3C Recommendation. URL: https://www.w3.org/TR/vc-data-model-2.0/
[XMLSCHEMA11-2]
W3C XML Schema Definition Language (XSD) 1.1 Part 2: Datatypes. David Peterson; Sandy Gao; Ashok Malhotra; Michael Sperberg-McQueen; Henry Thompson; Paul V. Biron et al. W3C. 5 April 2012. W3C Recommendation. URL: https://www.w3.org/TR/xmlschema11-2/

C.2 Informative references

[BUFF]
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. C. Cremers; S. Düzlü; R. Fiedler; M. Fischlin; C. Janson. 2020. URL: https://eprint.iacr.org/2020/1525
[Provable_Ed25519]
The Provable Security of Ed25519: Theory and Practice. Jacqueline Brendel; Cas Cremers; Dennis Jackson; Mang Zhao. Cryptology ePrint Archive, Paper 2020/823. 2020. URL: https://eprint.iacr.org/2020/823
[VC-DI-BBS]
Data Integrity BBS Cryptosuites v1.0. Greg Bernstein; Manu Sporny. W3C. 7 April 2026. CRD. URL: https://www.w3.org/TR/vc-di-bbs/
[VC-DI-ECDSA]
Data Integrity ECDSA Cryptosuites v1.0. Manu Sporny; Dave Longley; Greg Bernstein. W3C. 15 May 2025. W3C Recommendation. URL: https://www.w3.org/TR/vc-di-ecdsa/