Copyright © 2026 the Contributors to the Quantum-Safe Cryptosuites v0.3 Specification, published by the Credentials Community Group under the W3C Community Final Specification Agreement (FSA). A human-readable summary is available.
This specification describes several Data Integrity Cryptosuites for use when generating a digital signature using Post-Quantum digital signature algorithms.
This specification was published by the Credentials Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Final Specification Agreement (FSA) other conditions apply. Learn more about W3C Community and Business Groups.
This specification is experimental, do not use it in any production setting.
GitHub Issues are preferred for discussion of this specification.
This specification defines several cryptographic suites for the purposes of creating and verifying proofs for Post-Quantum signatures, in conformance with the Data Integrity [VC-DATA-INTEGRITY] specification.
This specification uses either the RDF Dataset Canonicalization Algorithm [RDF-CANON] or the JSON Canonicalization Scheme [RFC8785] to transform the input document into its canonical form. It uses a hash based on SHA-2 [RFC6234] and appropriate to the security category as the message digest, and supports a number of different Post-Quantum signature algorithms with varying properties such as public key size, signature size, and computational and implementational complexity.
Terminology used throughout this document is defined in the Terminology section of the Verifiable Credential Data Integrity 1.0 specification.
As well as sections marked as non-normative, all authoring guidelines, diagrams, examples, and notes in this specification are non-normative. Everything else in this specification is normative.
The key words MAY, MUST, and SHOULD in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.
A conforming proof is any concrete expression of the data model that complies with the normative statements in this specification. Specifically, all relevant normative statements in Sections 2. Data Model and 3. Algorithms of this document MUST be enforced.
A conforming processor is any algorithm realized as software and/or hardware that generates or consumes a conforming proof. Conforming processors MUST produce errors when non-conforming documents are consumed.
This document contains examples of JSON and JSON-LD data. Some of these examples
are invalid JSON, as they include features such as inline comments (//)
explaining certain portions and ellipses (...) indicating the omission of
information that is irrelevant to the example. Such parts need to be
removed if implementers want to treat the examples as valid JSON or JSON-LD.
The following sections outline the data model that is used by this specification to express verification methods, such as cryptographic public keys, and data integrity proofs, such as digital signatures.
These verification methods are used to verify Data Integrity Proofs [VC-DATA-INTEGRITY] produced using the cryptographic key material for the various algorithms and parameter sets supported by this specification. The encoding formats for these key types are provided in this section. Lossless cryptographic key transformation processes that result in equivalent cryptographic key material MAY be used during the processing of digital signatures.
The Multikey format, defined in Controlled Identifiers v1.0, is used to express public keys for the cryptographic suites defined in this specification.
The publicKeyMultibase property represents a Multibase-encoded Multikey
expression of a public key.
| Signature Name | Varint Code | Multi-Byte Prefix | Raw Public Key Size |
|---|---|---|---|
| ML-DSA-44 | 0x1210 | 0x9024 | 1312 |
| SLH-DSA-SHA2-128s | 0x1220 | 0xa024 | 32 |
| FALCON-512* | 0x122c | 0xac24 | 897 |
| SQIsign-I* | 0x122e | 0xae24 | 65 |
The Multikey encoding of a public key for a signature supported by this
specification MUST start with the corresponding multi-byte prefix for the
signature named in Table 1 followed by the raw public key bytes.
This multi-byte prefix is the varint expression of the varint code
given in the previous table.
The resulting value will have a byte length given by the raw public key size in
the table plus the length of the multi-byte prefix. This value MUST then be
encoded
using the base-64-url alphabet, according to the
Multibase section of
Controlled Identifiers v1.0 and then prepended with the base-64-url
Multibase header (u).
Examples of all the publicKeyMultibase encodings defined in this specification
can be found in appendix A. Test Vectors.
Note*: The codes given in Table 1 for FALCON-512 and SQIsign-I are preliminary and not currently registered with multicodecs. When these signature schemes are formalized by NIST or other SDOs these values should be updated/registered.
This section details the proof representation formats that are defined by this specification.
A proof contains the attributes specified in the Proofs section of [VC-DATA-INTEGRITY] with the following restrictions.
The type property of the proof MUST be DataIntegrityProof.
The cryptosuite property of the proof MUST be one of the following values from
Table 2.
| Name | Signature Algorithm | Signature Length |
|---|---|---|
mldsa44-rdfc-2024 |
ML-DSA-44 | 2420 |
mldsa44-jcs-2024 |
ML-DSA-44 | 2420 |
slhdsa128-rdfc-2024 |
SLH-DSA-SHA2-128s | 7856 |
slhdsa128-jcs-2024 |
SLH-DSA-SHA2-128s | 7856 |
falcon512-rdfc-2024 |
FALCON-512 | 666 |
falcon512-jcs-2024 |
FALCON-512 | 666 |
sqisign1-rdfc-2024 |
SQIsign-I | 148 |
sqisign1-jcs-2024 |
SQIsign-I | 148 |
The value of the proofValue property of the proof MUST be a signature produced
by the signature algorithm corresponding to the cryptosuite given in
Table 2.
This signature is produced according to using the algorithms specified in section
3. Algorithms, then encoded using the base-64-url-nopad header and
alphabet as described in the
Multibase section of [CID].
Examples of the proofValue for all the cryptosuites defined in this
specification can be found in appendix A. Test Vectors.
The following sections describe multiple Data Integrity cryptographic suites that utilize quantum safe signature algorithms at different claimed security categories. For a given claimed security category, an appropriate hash function MUST be use in the 3.1.1 Hashing.
From Recommendation for Key Management: Part 1r6 ipd -- General, Section 4.6.1.4 on the "Security Strengths of Hash Functions, XOFs, and Their Applications," the following hash function are chosen for use with digital signatures in Table 3.
| Security Strength | Hash Function |
|---|---|
| Category 1 or 2 | SHA-256 |
| Category 3 or 4 | SHA-384 |
| Category 5 | SHA-512 |
This specification supports cryptosuites based on both the Universal RDF Dataset
Canonicalization Algorithm [RDF-CANON], rdfc and JSON Canonicalization
Scheme [RFC8785], jcs. When the RDF Dataset Canonicalization Algorithm
[RDF-CANON] is used with the 3.1.2 Proof Configuration and 3.1.3 Transformation
algorithms the cryptographic hashing function that is passed to the
algorithm MUST be from Table 3 appropriate for the claimed security of the
signature scheme.
Implementations SHOULD fetch and cache verification method information as early as possible when adding or verifying proofs. Parameters passed to functions in this section use information from the verification method — such as the public key size — to determine function parameters — such as the cryptographic hashing algorithm.
When the RDF Dataset Canonicalization Algorithm [RDF-CANON] is used, implementations of that algorithm will detect dataset poisoning by default, and abort processing upon detection.
The following algorithm specifies how to cryptographically hash a transformed data document and proof configuration into cryptographic hash data that is ready to be provided as input to the algorithms for proof serialization and proof verification of each of the respective cryptosuites.
The required inputs to this algorithm are a transformed data document (transformedDocument), canonical proof configuration (canonicalProofConfig), and hash name (hashName). A single hash data value represented as a series of bytes is produced as output.
SHA-256,
let transformedDocumentHash be the result of applying the
SHA-256 (SHA-2 with 256-bit output)
cryptographic hashing algorithm [RFC6234] to the
respective transformedDocument.
Respective transformedDocumentHash will be exactly 32 bytes
in size.
SHA-384,
let transformedDocumentHash be the result of applying the
SHA-384 (SHA-2 with 384-bit output)
cryptographic hashing algorithm [RFC6234] to the
respective transformedDocument.
Respective transformedDocumentHash will be exactly 48 bytes
in size.
SHA-512,
let transformedDocumentHash be the result of applying the
SHA-512 (SHA-2 with 512-bit output)
cryptographic hashing algorithm [RFC6234] to the
respective transformedDocument.
Respective transformedDocumentHash will be exactly 64 bytes
in size.
SHA-256,
let proofConfigHash be the result of applying the
SHA-256 (SHA-2 with 256-bit output)
cryptographic hashing algorithm [RFC6234] to the
canonicalProofConfig. Respective proofConfigHash
will be exactly 32 bytes in size.
SHA-384,
let proofConfigHash be the result of applying the
SHA-384 (SHA-2 with 384-bit output)
cryptographic hashing algorithm [RFC6234] to the
canonicalProofConfig. Respective proofConfigHash
will be exactly 48 bytes in size.
SHA-512,
let proofConfigHash be the result of applying the
SHA-512 (SHA-2 with 512-bit output)
cryptographic hashing algorithm [RFC6234] to the
canonicalProofConfig. Respective proofConfigHash
will be exactly 64 bytes in size.
The following algorithm specifies how to generate a proof configuration from a set of proof options that is used as input to the proof hashing algorithm.
The required inputs to this algorithm are proof options (options), a cryptosuite identifier (cryptosuite), the canonicalization scheme (canonScheme) and hash name (hashName). The proof options MUST contain a type identifier for the cryptographic suite (type) and MUST contain the cryptosuite identifier (cryptosuite). A proof configuration object is produced as output.
DataIntegrityProof,
proofConfig.cryptosuite is not set to the cryptosuite,
or both, an INVALID_PROOF_CONFIGURATION error MUST be raised.
INVALID_PROOF_DATETIME error MUST be
raised.
rdfc,
let canonicalProofConfig be the result of applying the
Universal RDF Dataset Canonicalization Algorithm
[RDF-CANON] to the proofConfig, with hashing parameter set to hashName.
jcs,
let canonicalProofConfig be the result of applying the
JSON Canonicalization Scheme [RFC8785] to the proofConfig.
The following algorithm specifies how to transform an unsecured input document into a transformed document that is ready to be provided as input to the hashing algorithm in Section 3.1.1 Hashing.
Required inputs to this algorithm are an unsecured data document (unsecuredDocument), transformation options (options), a cryptosuite identifier (cryptosuite), the canonicalization scheme (canonScheme) and hash name (hashName). The transformation options MUST contain a type identifier for the cryptographic suite (type) and a cryptosuite identifier (cryptosuite). A transformed data document is produced as output. Whenever this algorithm encodes strings, it MUST use UTF-8 encoding.
DataIntegrityProof,
options.cryptosuite is not set to the cryptosuite
value, or both, then a PROOF_TRANSFORMATION_ERROR MUST be
raised.
rdfc,
let canonicalDocument be the result of applying the
Universal RDF Dataset Canonicalization Algorithm
[RDF-CANON] to the unsecuredDocument
with hashing parameter set to hashName.
jcs,
let canonicalDocument be the result of applying the
JSON Canonicalization Scheme [RFC8785] to the unsecuredDocument.
The following algorithm specifies how to serialize a digital signature from a set of cryptographic hash data. This algorithm is designed to be used in conjunction with the algorithms defined in Section 4: Algorithms of the Data Integrity specification [VC-DATA-INTEGRITY]. Required inputs are cryptographic hash data (hashData), proof options (options), and a signature function (sigFunc). The proof options MUST contain a type identifier for the cryptographic suite (type) and MAY contain a cryptosuite identifier (cryptosuite). A single digital proof value represented as series of bytes is produced as output.
The following algorithm specifies how to verify a digital signature from a set of cryptographic hash data. This algorithm is designed to be used in conjunction with the algorithms defined in Section 4: Algorithms of the Data Integrity [VC-DATA-INTEGRITY] specification. Required inputs are cryptographic hash data (hashData), a digital signature (proofBytes), proof options (options), and a verification function (verifyFunc). A verification result represented as a boolean value is produced as output.
This algorithm is used to configure a cryptographic suite to be used by the Add Proof and Verify Proof functions in Verifiable Credential Data Integrity 1.0. The algorithm takes an options object (map options) as input and returns a cryptosuite instance (struct cryptosuite).
DataIntegrityProof, return cryptosuite.
mldsa44-rdfc-2024 or mldsa44-jcs-2024 then:
slhdsa128-rdfc-2024 or slhdsa128-jcs-2024 then:
falcon512-rdfc-2024 or falcon512-jcs-2024
then:
sqisign1-rdfc-2024 or sqisign1-jcs-2024 then:
The Module-Lattice-Based Digital Signature Standard defined in Module-Lattice-Based Digital Signature Standard [FIPS-204] defines parameter sets for three different claimed security strengths. The claimed security strengths, private key, public key, and signature sizes are summarized in Table 4.
| Name | Security | Private Key | Public Key | Signature |
|---|---|---|---|---|
| ML-DSA-44 | Category 2 | 2560 | 1312 | 2420 |
| ML-DSA-65 | Category 3 | 4032 | 1952 | 3309 |
| ML-DSA-87 | Category 5 | 4896 | 2592 | 4627 |
Supporting both the Universal RDF Dataset Canonicalization Algorithm [RDF-CANON],
"rdfc", the JSON Canonicalization Scheme [RFC8785], "jcs", and a maximum
security category of 2, leads to the
family of ML-DSA cryptosuites given in Table 5.
| Name | Canonalization | Signature/Verification | Hash |
|---|---|---|---|
mldsa44-rdfc-2024 |
RDFC | ML-DSA-44 | SHA-256 |
mldsa44-jcs-2024 |
JCS | ML-DSA-44 | SHA-256 |
The following algorithm specifies how to create a data integrity proof given an unsecured data document and an ML-DSA cryptosuite chosen from Table 5. The choice of cryptosuite sets the values of canonScheme, hashName, sigFunc, and verifyFunc per Table 5, which are used in the algorithm below. Additional required inputs are an unsecured data document (map unsecuredDocument), and a set of proof options (map options). A data integrity proof (map), or an error, is produced as output.
The following algorithm specifies how to verify a data integrity proof given an secured data document. Required inputs are an secured data document (map securedDocument). This algorithm returns a verification result, which is a struct whose items are:
true or falsefalse; otherwise, an unsecured data document
proof value removed.
proofValue
removed.
true, otherwise NullThe Stateless Hash-Based Digital Signature Standard defined in Stateless Hash-Based Digital Signature Standard [FIPS-205] defines parameter sets for three different claimed security strengths, optimized for size or speed, and a specified hash function family. This specification considers a subset of these parameter sets, optimized for smaller size, and based on the SHA2 hash function family, as shown in Table 6.
| Name | Security | Private Key | Public Key | Signature |
|---|---|---|---|---|
| SLH-DSA-SHA2-128s | Category 1 | 64 | 32 | 7856 |
| SLH-DSA-SHA2-192s | Category 3 | 96 | 48 | 16224 |
| SLH-DSA-SHA2-256s | Category 5 | 128 | 64 | 29792 |
Supporting both Universal RDF Dataset Canonicalization Algorithm [RDF-CANON],
"rdfc", JSON Canonicalization Scheme [RFC8785], "jcs", and a maximum
security category of 1, leads to the
family of ML-DSA cryptosuites given in Table 7.
| Name | Canonizalization | Signature/Verification | Hash |
|---|---|---|---|
slhdsa128-rdfc-2024 |
RDFC | SLH-DSA-SHA2-128s | SHA-256 |
slhdsa128-jcs-2024 |
JCS | SLH-DSA-SHA2-128s | SHA-256 |
The following algorithm specifies how to create a data integrity proof given an unsecured data document and an SLH-DSA cryptosuite chosen from Table 7. The choice of cryptosuite sets the values of canonScheme, hashName, sigFunc, and verifyFunc as found in Table 7, for use in the algorithm below. Additional required inputs are an unsecured data document (map unsecuredDocument), and a set of proof options (map options). A data integrity proof (map), or an error, is produced as output.
The following algorithm specifies how to verify a data integrity proof given an secured data document. Required inputs are an secured data document (map securedDocument). This algorithm returns a verification result, which is a struct whose items are:
true or falsefalse; otherwise, an unsecured data document
proof value removed.
proofValue
removed.
true, otherwise
Null
The [FALCON] signature algorithm is undergoing standardization by NIST. The information presented here is based on the Post-Quantum Cryptography Round 3 Submission information. This section will be updated when the NIST specification is issued.
[FALCON] is a lattice-based signature scheme. It stands for the following acronym: FAst Fourier Lattice-based COmpact signatures over NTRU. FALCON defines parameter sets for two different claimed security strengths. The claimed security strengths, private key, public key, and signature sizes are summarized in Table 8.
| Name | Security | Private Key | Public Key | Signature |
|---|---|---|---|---|
| FALCON-512 | Category 1 | 1281 | 897 | 666 |
| FALCON-1024 | Category 5 | 2305 | 1793 | 1280 |
Private key size information from openquantumsafe.org.
Supporting both the Universal RDF Dataset Canonicalization Algorithm [RDF-CANON],
"rdfc", the JSON Canonicalization Scheme [RFC8785], "jcs", and a maximum
security category of 1, leads to the
family of FALCON cryptosuites given in Table 9.
| Name | Canonalization | Signature/Verification | Hash |
|---|---|---|---|
falcon512-rdfc-2024 |
RDFC | FALCON-512 | SHA-256 |
falcon512-jcs-2024 |
JCS | FALCON-512 | SHA-256 |
The following algorithm specifies how to create a data integrity proof given an unsecured data document and a FALCON cryptosuite chosen from Table 9. The choice of cryptosuite sets the values of canonScheme, hashName, sigFunc, and verifyFunc per Table 9, which are used in the algorithm below. Additional required inputs are an unsecured data document (map unsecuredDocument), and a set of proof options (map options). A data integrity proof (map), or an error, is produced as output.
The following algorithm specifies how to verify a data integrity proof given an secured data document. Required inputs are an secured data document (map securedDocument). This algorithm returns a verification result, which is a struct whose items are:
true or falsefalse; otherwise, an unsecured data document
proof value removed.
proofValue
removed.
true, otherwise NullThe SQIsign signature algorithm has been submitted to NIST. SQIsign aims for very compact key and signature sizes. The information presented here is based on specification v2.01, 2025-07-07. This section will be updated as appropriate.
SQIsign relies on the hardness of a computational problem from number theory: computing the endomorphism ring of a supersingular elliptic curve, the endomorphism ring problem. SQIsign defines parameter sets for three different claimed security strengths. The claimed security strengths, private key, public key, and signature sizes are summarized in Table 10.
| Name | Security | Private Key | Public Key | Signature |
|---|---|---|---|---|
| SQIsign-I | Category 1 | 353 | 65 | 148 |
| SQIsign-III | Category 3 | 529 | 97 | 224 |
| SQIsign-V | Category 5 | 701 | 129 | 292 |
Supporting both the Universal RDF Dataset Canonicalization Algorithm [RDF-CANON],
"rdfc", the JSON Canonicalization Scheme [RFC8785], "jcs", and a maximum
security category of 1, leads to the
family of SQIsign cryptosuites given in Table 11.
| Name | Canonalization | Signature/Verification | Hash |
|---|---|---|---|
sqisign1-rdfc-2024 |
RDFC | SQIsign-I | SHA-256 |
sqisign1-jcs-2024 |
JCS | SQIsign-I | SHA-256 |
The following algorithm specifies how to create a data integrity proof given an unsecured data document and a SQIsign cryptosuite chosen from Table 11. The choice of cryptosuite sets the values of canonScheme, hashName, sigFunc, and verifyFunc per Table 11, which are used in the algorithm below. Additional required inputs are an unsecured data document (map unsecuredDocument), and a set of proof options (map options). A data integrity proof (map), or an error, is produced as output.
The following algorithm specifies how to verify a data integrity proof given an secured data document. Required inputs are an secured data document (map securedDocument). This algorithm returns a verification result, which is a struct whose items are:
true or falsefalse; otherwise, an unsecured data document
proof value removed.
proofValue
removed.
true, otherwise
NullThis section is non-normative.
Before reading this section, readers are urged to familiarize themselves with general security advice provided in the Security Considerations section of the Data Integrity specification.
The following section describes security considerations that developers implementing this specification should be aware of in order to create secure software or protocols based on verifiable credentials signed using the cryptosuites defined here.
All signature suites in this specification are designed to satisfy either existential unforgeability under chosen-message attacks (EUF-CMA) or strong unforgeability under chosen message attacks (SUF-CMA) or both as defined below.
EUF-CMA (existential unforgeability under chosen message attacks) is usually the minimal security property required of a signature scheme. It guarantees that any efficient adversary who has the public key of the signer and received an arbitrary number of signatures on messages of its choice (in an adaptive manner): , cannot output a valid signature for a new message (except with negligible probability). If the attacker outputs a valid signature on a new message: , it is called an existential forgery.
SUF-CMA (strong unforgeability under chosen message attacks) is a stronger notion than EUF-CMA. It guarantees that for any efficient adversary who has the public key of the signer and received an arbitrary number of signatures on messages of its choice: , it cannot output a new valid signature pair , such that (except with negligible probability). Strong unforgeability implies that an adversary not only cannot sign new messages, but also cannot find a new signature on an old message. See [Provable_Ed25519] for a real world attack that would have been circumvented with SUF-CMA security over EUF-CMA security.
Besides EUF-CMA and SUF-CMA there are additional properties a digital signature scheme can possess that may be essential for overall software or protocol security depending on the application. These are discussed in [BUFF], which is also referenced by [FIPS-204] and [FIPS-205]. These additional properties are defined in [BUFF] as: exclusive ownership, message-bound signatures, and non re-signability.
Exclusive Ownership (EO): the property that a signature only verifies under a single public key. Without this property a system could be vunerable to an attack that allows constructing another key pair under which a given signature verifies, but never breaks the EUF-CMA property. Such an attack is documented in both [BUFF] and in [Provable_Ed25519] where it is called a "key substitution attack".
Message-Bound Signatures (MBS): the property that a signature is only valid for a unique message. This property is key for data integrity and all signature schemes chosen here currently support it. From [BUFF]: "A possible cause can be the presence of weak keys that verify multiple or even all messages. The absence of this property can lead to problems in protocols that depend on uniqueness properties in the presence of adversarially chosen keys."
Non Re-signability (NR): meaning that one cannot produce a signature under another key given a signature for some unknown message m, i.e., that an adversary cannot produce a legitimate signature verifying under its public key for a message it does not know. See [BUFF] for an example of a system that could be vulnerable without this property.
In Table 12 we summarize the known security properties of the signature schemes in this specification.
| Name | EUF-CMA | SUF-CMA | EO | MBS | NR |
|---|---|---|---|---|---|
| ML-DSA | Yes | Yes | Yes | Yes | Yes |
| SLH-DSA | Yes | No | Unknown | Yes | Unknown |
| FALCON* | Yes | No | No | Yes | No |
| SQIsign | Yes | No | Yes | Yes | Yes |
Note*: This is based on the "third round FALCON" currently used hear and according to [BUFF] will be updated when FIPS-206 is released.
Before reading this section, readers are urged to familiarize themselves with general privacy advice provided in the Privacy Considerations section of the Data Integrity specification.
The following section describes privacy considerations that developers implementing this specification should be aware of in order to avoid violating privacy assumptions.
The cryptographic suites described in this specification do not support selective disclosure or unlinkable disclosure. If selective disclosure is a desired feature, readers might find the Data Integrity ECDSA Cryptosuites v1.0 specification useful. If unlinkable disclosure is of interest, the Data Integrity BBS Cryptosuites v1.0 specification provides an unlinkable digital signature mechanism.
A relatively efficient selective, but not unlinkable, disclosure mechanism can be created by combining the selective disclosure functions defined in Data Integrity ECDSA Cryptosuites v1.0 with the "salted hash" approach of SD-JWT, if there is sufficient interest.
This section is non-normative.
Inputs used in two or more test vectors are given in this section. They include the unsigned document, general proof options, and cryptographic keys.
The common unsecured data document used for generating all test vectors that require this input is given below.
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3id.org/citizenship/v4rc1"
],
"type": [
"VerifiableCredential",
"EmploymentAuthorizationDocumentCredential"
],
"issuer": {
"id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
},
"credentialSubject": {
"type": [
"Person",
"EmployablePerson"
],
"givenName": "JOHN",
"additionalName": "JACOB",
"familyName": "SMITH",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
"gender": "Male",
"residentSince": "2015-01-01",
"birthCountry": "Bahamas",
"birthDate": "1999-07-17",
"employmentAuthorizationDocument": {
"type": "EmploymentAuthorizationDocument",
"identifier": "83627465",
"lprCategory": "C09",
"lprNumber": "999-999-999"
}
},
"name": "Employment Authorization Document",
"description": "Example Employment Authorization Document.",
"validFrom": "2019-12-03T00:00:00Z",
"validUntil": "2029-12-03T00:00:00Z"
}
A general template for the proof options used by test vectors that require this input is given below.
{
"type": "DataIntegrityProof",
"cryptosuite": "Crytosuite name to be specified here",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key value for issuer public key here",
"proofPurpose": "assertionMethod"
}
For each specific test case the cryptosuite and verificationMethod fields
need to be set. For example, for the slhdsa128-rdfc-2024 cryptosuite using the
appropriate public key information from section A.1.3 Example Cryptographic Keys the specific
proof options is given below.
{
"type": "DataIntegrityProof",
"cryptosuite": "slhdsa128-rdfc-2024",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw",
"proofPurpose": "assertionMethod"
}
Cryptographic keys for used to generate output for specific signature suites are
given below. This includes public and private (secret) keys in hexadeximal
format and the public key as a publicKeyMultibase.
{
"mldsa44": {
"publicKeyHex": "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",
"secretKeyHex": "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",
"publicKeyMultibase": "ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL"
}
}
{
"slh128s": {
"publicKeyHex": "4834a55ff26a17f3947a265bc421093a629d2e863381f8f9f6d64f707cf2e95b",
"secretKeyHex": "765d610794caa0dd67472ed92b8ec0b23c1d57c8ed25a9147be7dcd5dca241fb4834a55ff26a17f3947a265bc421093a629d2e863381f8f9f6d64f707cf2e95b",
"publicKeyMultibase": "uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw"
}
}
{
"falcon512": {
"publicKeyHex": "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",
"secretKeyHex": "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",
"publicKeyMultibase": "urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k"
}
}
{
"sqisign1": {
"publicKeyHex": "e144bdf2447d65170073bf86c3e2d241fe9c6aaae3065c1d7f4a3d0f3ce10303dd99e0b81dec4f85bca1fe5ecfa12ed2f8c2f5bc58bd751b7b1431d8640ca8030b",
"secretKeyHex": "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",
"publicKeyMultibase": "uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw"
}
}
The Proof Configuration algorithm output is dependent on the specific proof
options as well as the parameters, hence an output test vector for Proof
Configuration is given for each supported cryptosuite.
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> . _:c14n0 <https://w3id.org/security#cryptosuite> "mldsa44-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> . _:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> . _:c14n0 <https://w3id.org/security#verificationMethod> <did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL> .
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> . _:c14n0 <https://w3id.org/security#cryptosuite> "slhdsa128-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> . _:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> . _:c14n0 <https://w3id.org/security#verificationMethod> <did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw> .
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> . _:c14n0 <https://w3id.org/security#cryptosuite> "falcon512-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> . _:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> . _:c14n0 <https://w3id.org/security#verificationMethod> <did:key:urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k> .
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> . _:c14n0 <https://w3id.org/security#cryptosuite> "sqisign1-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> . _:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> . _:c14n0 <https://w3id.org/security#verificationMethod> <did:key:uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw> .
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"created":"2023-02-24T23:36:38Z","cryptosuite":"mldsa44-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL"}
{"@context":["https://www.w3.org/ns/credentials/v2","https://www.w3.org/ns/credentials/examples/v2"],"created":"2023-02-24T23:36:38Z","cryptosuite":"slhdsa128-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw"}
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"created":"2023-02-24T23:36:38Z","cryptosuite":"falcon512-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k"}
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"created":"2023-02-24T23:36:38Z","cryptosuite":"sqisign1-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw"}
In addition to the common unsecured data document the Transform algorithm
takes parameters canonScheme and hashName. Only in the case of canonScheme
equal to rdfc does the hashName parameter matter. This is reflected in the
set of Transformation output test vectors given below.
<did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg==> . _:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocumentCredential> . _:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://www.w3.org/2018/credentials#VerifiableCredential> . _:c14n0 <https://schema.org/description> "Example Employment Authorization Document." . _:c14n0 <https://schema.org/name> "Employment Authorization Document" . _:c14n0 <https://www.w3.org/2018/credentials#credentialSubject> _:c14n1 . _:c14n0 <https://www.w3.org/2018/credentials#issuer> <did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> . _:c14n0 <https://www.w3.org/2018/credentials#validFrom> "2019-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n0 <https://www.w3.org/2018/credentials#validUntil> "2029-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://schema.org/Person> . _:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmployablePerson> . _:c14n1 <https://schema.org/additionalName> "JACOB" . _:c14n1 <https://schema.org/birthDate> "1999-07-17"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n1 <https://schema.org/familyName> "SMITH" . _:c14n1 <https://schema.org/gender> "Male" . _:c14n1 <https://schema.org/givenName> "JOHN" . _:c14n1 <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==> . _:c14n1 <https://w3id.org/citizenship#birthCountry> "Bahamas" . _:c14n1 <https://w3id.org/citizenship#employmentAuthorizationDocument> _:c14n2 . _:c14n1 <https://w3id.org/citizenship#residentSince> "2015-01-01"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocument> . _:c14n2 <https://schema.org/identifier> "83627465" . _:c14n2 <https://w3id.org/citizenship#lprCategory> "C09" . _:c14n2 <https://w3id.org/citizenship#lprNumber> "999-999-999" .
<did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg==> . _:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocument> . _:c14n0 <https://schema.org/identifier> "83627465" . _:c14n0 <https://w3id.org/citizenship#lprCategory> "C09" . _:c14n0 <https://w3id.org/citizenship#lprNumber> "999-999-999" . _:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://schema.org/Person> . _:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmployablePerson> . _:c14n1 <https://schema.org/additionalName> "JACOB" . _:c14n1 <https://schema.org/birthDate> "1999-07-17"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n1 <https://schema.org/familyName> "SMITH" . _:c14n1 <https://schema.org/gender> "Male" . _:c14n1 <https://schema.org/givenName> "JOHN" . _:c14n1 <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==> . _:c14n1 <https://w3id.org/citizenship#birthCountry> "Bahamas" . _:c14n1 <https://w3id.org/citizenship#employmentAuthorizationDocument> _:c14n0 . _:c14n1 <https://w3id.org/citizenship#residentSince> "2015-01-01"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocumentCredential> . _:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://www.w3.org/2018/credentials#VerifiableCredential> . _:c14n2 <https://schema.org/description> "Example Employment Authorization Document." . _:c14n2 <https://schema.org/name> "Employment Authorization Document" . _:c14n2 <https://www.w3.org/2018/credentials#credentialSubject> _:c14n1 . _:c14n2 <https://www.w3.org/2018/credentials#issuer> <did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> . _:c14n2 <https://www.w3.org/2018/credentials#validFrom> "2019-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n2 <https://www.w3.org/2018/credentials#validUntil> "2029-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
<did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg==> . _:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocument> . _:c14n0 <https://schema.org/identifier> "83627465" . _:c14n0 <https://w3id.org/citizenship#lprCategory> "C09" . _:c14n0 <https://w3id.org/citizenship#lprNumber> "999-999-999" . _:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocumentCredential> . _:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://www.w3.org/2018/credentials#VerifiableCredential> . _:c14n1 <https://schema.org/description> "Example Employment Authorization Document." . _:c14n1 <https://schema.org/name> "Employment Authorization Document" . _:c14n1 <https://www.w3.org/2018/credentials#credentialSubject> _:c14n2 . _:c14n1 <https://www.w3.org/2018/credentials#issuer> <did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> . _:c14n1 <https://www.w3.org/2018/credentials#validFrom> "2019-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n1 <https://www.w3.org/2018/credentials#validUntil> "2029-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://schema.org/Person> . _:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmployablePerson> . _:c14n2 <https://schema.org/additionalName> "JACOB" . _:c14n2 <https://schema.org/birthDate> "1999-07-17"^^<http://www.w3.org/2001/XMLSchema#dateTime> . _:c14n2 <https://schema.org/familyName> "SMITH" . _:c14n2 <https://schema.org/gender> "Male" . _:c14n2 <https://schema.org/givenName> "JOHN" . _:c14n2 <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==> . _:c14n2 <https://w3id.org/citizenship#birthCountry> "Bahamas" . _:c14n2 <https://w3id.org/citizenship#employmentAuthorizationDocument> _:c14n0 . _:c14n2 <https://w3id.org/citizenship#residentSince> "2015-01-01"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"credentialSubject":{"additionalName":"JACOB","birthCountry":"Bahamas","birthDate":"1999-07-17","employmentAuthorizationDocument":{"identifier":"83627465","lprCategory":"C09","lprNumber":"999-999-999","type":"EmploymentAuthorizationDocument"},"familyName":"SMITH","gender":"Male","givenName":"JOHN","image":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==","residentSince":"2015-01-01","type":["Person","EmployablePerson"]},"description":"Example Employment Authorization Document.","issuer":{"id":"did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76","image":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="},"name":"Employment Authorization Document","type":["VerifiableCredential","EmploymentAuthorizationDocumentCredential"],"validFrom":"2019-12-03T00:00:00Z","validUntil":"2029-12-03T00:00:00Z"}
The Hashing algorithm takes as inputs the results of the Proof Configuration and Transformation algorithms. Since the Proof Configuration algorithm output is cryptosuite specific the Hashing algorithm output is given for each cryptosuite test case. The Hashing output for each cryptosuite test case is given in hexadecimal format below.
The first half of the hexadecimal Hashing result is the hash of the output of the Proof Configuration algorithm, while the second half of the hexidecimal value is the hash of the output from the Transformation algorithm and both can be useful information when debugging.
{
"mldsa44-rdfc-2024": "fa074359f280ed66bd74b65c8f644175b2f413e24ef3b917d557b3bc261b28f203f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
"mldsa44-jcs-2024": "1f49de8352bfcdef9457b14be9f4375c7288fb914cf1c974eab20f3d145b011a6ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc",
"slhdsa128-rdfc-2024": "26c114126bfe7aa69e33fe6c66150d816134726e71e3b1ab7f991a132f2b6ef803f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
"slhdsa128-jcs-2024": "7cc816b810b96de7a90e38d1ff5bb1666476e1f53a16ea7e14a8447fa5ac34566ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc",
"falcon512-rdfc-2024": "588886466ce3de13a82dfb8bad0d7ee27b94f80a73c50f2d7741126c71d143e303f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
"falcon512-jcs-2024": "ba0ab0c5e9a26cfe5aa89a59b4ae53a3f4b6bdf3307769d21fef7f2dc11864be6ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc",
"sqisign1-rdfc-2024": "f35e179a21495698798ec6f982353e16bea9d14374ab9b659cd0afebcb1417c903f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
"sqisign1-jcs-2024": "4c1d4ef51ede749b051fb4b471e7da7d3c37af030fdd66323922fc89ef4a7dfa6ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc"
}
The Create Proof algorithm output is cryptosuite specific and uses the outputs of the Proof Configuration, Transformation, Hashing, and Proof Serialization algorithms. The output for each cryptosuite test case is given below.
The output of the Proof Serialization common algorithm is not given
separately since it is contained in the proofValue attribute in the following
examples and can be quite lengthy for some quantum safe signature algorithms.
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3id.org/citizenship/v4rc1"
],
"type": [
"VerifiableCredential",
"EmploymentAuthorizationDocumentCredential"
],
"issuer": {
"id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
},
"credentialSubject": {
"type": [
"Person",
"EmployablePerson"
],
"givenName": "JOHN",
"additionalName": "JACOB",
"familyName": "SMITH",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
"gender": "Male",
"residentSince": "2015-01-01",
"birthCountry": "Bahamas",
"birthDate": "1999-07-17",
"employmentAuthorizationDocument": {
"type": "EmploymentAuthorizationDocument",
"identifier": "83627465",
"lprCategory": "C09",
"lprNumber": "999-999-999"
}
},
"name": "Employment Authorization Document",
"description": "Example Employment Authorization Document.",
"validFrom": "2019-12-03T00:00:00Z",
"validUntil": "2029-12-03T00:00:00Z",
"proof": {
"type": "DataIntegrityProof",
"cryptosuite": "mldsa44-rdfc-2024",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL",
"proofPurpose": "assertionMethod",
"proofValue": "u_LfmjHGGR1q1D2_Ue-KKAwdZpSirCp8NGDu6EDN3DzRKUAlz_pl_JNlzd3Pg4dNAUCGc-avNt1ZQr4y5P_h6C3tP_HTaNIfVIx1O-D9Ooy59PgjHZLWAWiMiVx2hfPiLg88dVAMqpp1gjuiL8XRYiGLDQONRCoRXjTd-fZ6cg81p-NZ8ISINOjWJfWkf62avqWVp0yTBM2jPaNIkbfHCoUpwdwSj_NhXJMd10qag_hF_Hob_Abjuz-eAmg76AkSP0R-8l7peBmqfwP7TcSKPGBT_FUGjwbEkse2136YiNdYlk-NALtyz1PRk85tXood34_RTqCiHpa465ey2cJQ7Ve8zYQvU00u1SLF49ahIZfFGbiXpbVWHHCmvIGuqIxwq6hkRT_f-5T8SHOWmRUutnk7l5bvK2BqSBB2vd2yJexEe1j_wH-Nd5TYmqFq5Zg42zxpd7abSPqcNkkTZUPeOsrghrFT-glm0xr2uWAoTGn6FYye-_YM58hV2JE295a2PPg1wJcvN1AEnhwANGL_SlM6r2r0g5wesPY0cBMNJpXenI4_iY5EjINGZcjlShAGFGqx37hyPElHaYUortI_5s-PwyWGSJeHJ8IJBNO_M0okoy1yF6DefSbdDghWOnRWUYvzJMiwvM8TkxSABlIJ5oevyiZR5cHVpKgvaNYsIxzkK2bUVPJ_E_GpIHEpGnlS5Y3yji_SdoG5mufkj3D_PLY71qzs3k8SfN7KRtXp5nwwjw1khyHpqN-sRbV1gu31-NcWVR35x_a8zzxEcV5i1Q6hzpp9Gi_VgfOxJZIeuOc8G3uDEmjnIlhFfHgnCIwRJ2TQZs90nahcrYyNUdy7PMtmRKBiVIBYC57fA3kndbzHfzM2Ed12Mv75MnSK1Io55nfk8jTdxKCynrEZRtGhxLlQ9eoA1zO66haknhc95FVJZh5e0tjew4EQprlhdpBR4t0fJChAAqgrJNQ9ov17Nt5Ly6N8gGzgImzI1qN2mClYHX7ow4yzAeetZW_5WEaLyn57f0Tf1kcz9AS3TJNEOHgfAs7ZXfDNCFLgR5Bb0XWhL_2IP6rbeChcB9WQEQX36kGjIJfnUx0B2OSGNUF0Vjj3Zkr6IP37MATawid9pbYtytcY5KC9pn71KhzBqA5c6xJ4mdFXDZIbA9qEPfDsUao4GYPoVeV-0YXVXe7nlUmFp4WTCxoePGZbJcRWtHTegpVgtKvynhmIdHa_CYP_M_KKaeAhiufFCc7JYmyj6rdwz-xipAiAIHsdgrgtRgEdH_jrhFKEPP7gC9S8tK6NCpEWpzXaRnBkQTAQyt0IMMyyGHAgoHx_3wFQynT-7IeKb5si_i7penySiP7QQigJ6SB1nC7m0aLDWvcZ-X3A03BMqlYTgE8EWvJHtjmsjJSoOulD_WN_mLhXIIkI8mhX6-1GggQBg3JkqyRr1i-hdnpjE7iCgQnaS6Gk8O0gU8i_EoQh97275vaf-NwaXun-p3X_0U3cwTzsGGD-EIJu-zUwSThIUa4nKyImm-yrWh-r8tnQ4_o4gl8Avsw4Y4YQ8v9d3U0nr3E_xw0vKWMLxenn2xYGxo-wy-7W-9S8-SnjqyUxeDI1IwRzHYWHjP6_NK88jzpVTP90ySiIg_pAPxff7-xU-xtIgc_41bH1mjIVL_lK0sTS9F6acxGY7J0ijPMglCD72QUUx-J0OdESpxOhx3o4jc2thRhYzLPmZ9mXEMHwMf87Td-pdwBFFI8ff4eOozn7nZbih27UL-w2Xv4fHbBkAi0njje7JDkl5DyuyCkR86aVv1yTFemiq3rY8oHhCUIiUq3HyqCA5wD0mx43RDH00bTEQb2hPQ6CEKrgzpSp39fS6hsZBGCFXkPxsQAGOkRlnTPkIdg-pl1sVz4CNcpDcOBZ9ZNFBSSw7Nc4DUefLTD2n6nCswhQJL2wBbPJt24M5ckBD_0_CH7WwprAJKHgrJS1NY7X5iDaBl_8GvIW73xKsYBL9ZdUbuvp6ALAuQD9lsrXlzGZ0VbO7ap4484dr_v4zxteh82ksGbZZ3ujCqmIU9lqTtR5ahX9GGsLfIqczWyZbczYS9xU3ow7rG5muPDuZ9EVScvEkTbnP8Dw2238YKTuZIIALDShMYUqwPjnUpORlLg_MyRodiaVR6PdXbYSAeRchLXPNiwifsjvHbLnTeFeVGjshluYEpB9FdxJRAJpPMTsa0-t06q0e4FZXU9fs9lOwz0HpbJEa774XUTrM1XtqyAh2yKHhtTCQ6_PduO9PJE-OkLx12W2nc_ql7IW7BGyylwee-RaSVKmg26G_0ozVx--pBa-HZpcgNIleI3CY1TwMzZsT49QNMJ0hmsnr5mumiX8eRmmo_GeT6fKY3AxSnc0Y6yrTmT5MP0wSz3jssXplN6UkzahDPUww_zN2Tc10Kf9ehHrqCGrZho9r5Eq1o6_yXgdNogbiEl_VltIVsujdwoUHNSOzZJ2lKYsB2X0o6G6nSvXjWJr9F3DBivxsDERQTWOyGB3t_0ogmCGnwelnB9k-mz90TwbQ_2K2xd7Eoe6rfSJDTDt25u9dSI9TGvDow7fmglua7obkDlXz8JzQCfNhPqAO2Mv9TqqGywbDqwucJDgfFRhf6Rp7LTRUHQmQeLZCu1wfCCkBHs2SEIyj53AvNP1qtoLon60AQ5jP0sW1XTZHsi6xS0W_6qZq5UXFHNoERFOdkb1Ry1F4ScixWxHvXMn4SkRfQMga7ejtK2AO2ofJc-oun6IkE_qiNnu35JXJjvANMhgPwmoHme75e_bFvmHQn0JY2Fg1DrrvXWgE1S2uDJwtXJ3pi8SlRUfzEJR634Zw4jZWxxSYc96J1PO45jpA67l2PDbIxrqKZhkx17zy1ASfdSnlRLYcbqaTfPqPb1IuXm31cA56IQijOM8YNFbEfe9u5ysx4q-QyiluT91ZcCMtDOyR8pXUBR8UTSFkMNVrvE7erdosWSZM22SHF7LYlSK4-L9pybOndjM81gE_2yRtWgNkmEhTP9wGqBa_MfDxSa7iTUBr9joSn6SgCUyfufT1ZRlnIF0FU_qYYWWL9jdbV4k9v6aetHY5sgS-2fgJRGvy8bKD6M55TfMxQrI3XGCf6RAZGlNnf47T6g0SFx8hJi1EVFljcIuQo7PGBoS7vfUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAUOHyQ"
}
}
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3id.org/citizenship/v4rc1"
],
"type": [
"VerifiableCredential",
"EmploymentAuthorizationDocumentCredential"
],
"issuer": {
"id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
},
"credentialSubject": {
"type": [
"Person",
"EmployablePerson"
],
"givenName": "JOHN",
"additionalName": "JACOB",
"familyName": "SMITH",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
"gender": "Male",
"residentSince": "2015-01-01",
"birthCountry": "Bahamas",
"birthDate": "1999-07-17",
"employmentAuthorizationDocument": {
"type": "EmploymentAuthorizationDocument",
"identifier": "83627465",
"lprCategory": "C09",
"lprNumber": "999-999-999"
}
},
"name": "Employment Authorization Document",
"description": "Example Employment Authorization Document.",
"validFrom": "2019-12-03T00:00:00Z",
"validUntil": "2029-12-03T00:00:00Z",
"proof": {
"type": "DataIntegrityProof",
"cryptosuite": "mldsa44-jcs-2024",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL",
"proofPurpose": "assertionMethod",
"proofValue": "uTSucVLvXmOpmjGGNB-B9rM-u4HzBxN8ZIuZbpTHrjOTNBnahoE4PSdkeD-IzLLXykJn0aYq_APExy-Ka0BcJNMvKgkdjbbP33WmUwkzljno3szRUDrN9KX2DMH7j0iOBakU4ByjD-hTSO1iR6rlxsZPHJM1H-WLMhzVSggBILAuglItzstl663Gz5bFjEfbKAgfe50L4v4PjLFSDbJYcg65GtCKRXISkWrnJRuToWwvTVdcnIBOQwPBFKsvApPJMKrUTkIuZf4-V1uJ81zzct4o20O-DqLQ5bHfOR2n5Y4DSy6e5zg0-S3ADKtMtuPaQ8cAPUTEKRXGRQnSndnrtgMh2dimvpSaaw0TDy7zY6vrDxJa1tkrS0ulKf3Xz8xsNrNIkx4SaKYWPTjhRvdKqjdrpbGRt3mRSFFc0VE8vK44F_EVFIhwouL-4Rm4mXU2QkiO0YkwuAJM-QdWUACqzJ7TSf2QrrU8zAwOLbrGS5uZ1qLGD1PcgWfg2d0zTAYmcWP4LP63fTnFxwr-L0N_3MLFXixHNEp5osMlo2lhl5noDCmQpqCgluxkd5gXs1NSpOBbWVQyYWcj0WMBtMam8AeqXpA39L7oqvYxqbEpiwvKrmHsXIEZrnsHKCk2P0yc10AFCCtsIapvTHwIAjbDhX11HFU5cci4X5vCdG2BUzRsgmGeiYiUClCHmqsBW4z2GA9r0d9jtHZ03nMie_qS95XPsXuAFqypsP1HOfcIUAHHS9Wn4XGFz3hXoqMsmoUGRg9vEpC2j_nkcYZQphYLs54veWq5BBzoMqPuvYhhRdawdCnn-LTf7AxQgVGoRTpTy4IkXxr_pC1LUJZJkdKeG-2TuQzyHSkbMPu3YbWsGy2KxdGeFN2yUI8TTQ-MFHl-_jDCRBrAYyCVOgML4NAtbGqvs7h2tGZYI-m9MfjG0vjp7CUyIPD8BV-Yhku_bHd0hcrseKtYYyUjxISf2wveo4dfQ2AnCVdDAbBmznjPIDlkqx0316sRc-vXJGRQmfXOW1dNk-7WNBrJVQbnT9m6cf0UEl3mEgagk1_lLOxTgjzZRpWcOB827VB3hPi7RdI6U6knXuOflHPt9BZN7i6OAl76k69uMFH2KNH3Abm0GDhOv_nu1lEaOH8aXdOqL3U8Yo0cp5roOoTw5fJP2gxwI3DY0TOWeNOCfLXmnodgoGaKG2Vns4_-gN_Mg7g0ZinguwJMwKACx07H__ffh8jYQdc87EjCNyH4m8hJICvcC81J7CKb89YTZm7IM0D1_qTR5t-DkuU4ypxNuFOCxWpN9y2QiLAAobDdc1Y_S3nXFFkLmsn7hUNhcgXxPC3jLifiM0IV7DAqmQpk2ZGE59l0VTKb3F2Ualj9JcqKtLg_b2KqprUol9WtjFlkbxqJPYyCKnSEitzDnDsfxTRFEIViTx5-1SFb0NjPE_hv5MewCkizNpfo0b-m-FxvyWJnDYt4Igv8JtgF0K_xMRC9Tf3NaQgFHb1OgkBz04C3wsxoPLqTgMWoxcZ2-2x7TRRvX2Nh1Ye-ZrpmF5hVeRMK0ECj_t5HLPaq2md18rqnhwsZv84-V0eReDyXVIhkE2eAKedCM9t13UjTfF1qFoUQ3D8xQ6MfR7zFwf6X78Tb0EFs0cBQ1TatzWysbE2b_0k-YbT78G4Ko8FlmTljBN1b0StKxzOE1Kp1h4nDBY9jZYYPNnVrtAGn2AKN3HWr0bhhF8fW_G4SA_MGu2r6LnobB3MLCSj1lbVZSk5YtCtMnkldAsDagoI8lRBlKW1R7PFvXatSHcwbe352nVuvZYxs9QJVSylf2QS1xeUQUMS4AHd4h8Y9HqmnGPr5JX65uch8sr1bWcpGiNlwnMlFy89pnEZU2v7IiC_foLi8JbxMud1k2XRDwThhepEf5bxqlBcgjF8vAbGEKAJg5Oahl0GCBffuHhuUXmuF6XwOxLovlJUM8oFCTayQL42NGz_Z2cuFltmiy-cbI8NmEpvlOPnGZBj00ZIrp9tAgwepYvlt5ticFn9ufU-f8xZpBpZb-rf5sVTNqYmoOYvhKVhE5cCPpCbzZ5GvW5ukB8yLLJC5sc6df9oSoujovfA_VAXqsvmBuKU4cHcNTNEqzsGEg_l0ln5FIHKH3CRUTDemKN2vbtmTz1snn4VfdBFAlhJhBItpBmd3HibH-1q2WD313j-cE5nW_QgQeDn_JFJ7zwlORQVRUkeB942HJjkHWXCJMXz9LKxdncKalaVNm-yVjDkQdgA1tKl9bc_QnAL7HWhtHFc_XhzJvQxqLJ0aLUkkrnphrqscG6D_Kdh7aTTkDjDSA-dmgRQBh51YVBnfnp5V28AwmGXXglBAWCWChGmAtac6xeLbxW143426J4HMAUIpLgNhjetQoQqKzVTIpzcyo-GK8L3C0calt57orTswSRqDjxg_6zAQ6RPNoThToRqb2QgHr-gOop6NEJkEy0K8GwPg3nYAFgVVjcCyDtMEbIrHXJ9WKg3oTd14eC7GNZgQ75aP3HpUAqT5gqWdxer35Ohs3n1FylwreS1kOZ5Z4OVW5PVJkNHhKPfaNq4mQT5vBAWlWphOotPHwTbN7oMiOGYu-AMTnsLPCn0A3VEXx16EROpu0zlVisEZo1sya8nQaJYiI_i3MEWqvV2ypvcMDYt_ArFjxMU3tjV5tNcJgIoE5E5UCGyo2HQMvN03T0GdHZr7txswg9HpRJqntiJzm0iAr9BhRPfErg4HLQyc92gOH6UdczP4hvbweP3mcW67yUT3lH31vznZ5lIJ0pth3H_7khwUff5daIROar2usWxoMWTItY5HC7v5HBjnfqj4EoVi1A4Uw7RvHhaCMkfDrqqntNM0TDDSfDP1uCB1RwZtcuWpNfLWYyP1B9XqwKg3EworHhIq1vI74gZROvebyYqx8UCFeiLubTfXHJrC2evT99ha6jf7vg8zKgew6Cj3Jz_RSRE5rF5uQQno6PsevbKKtZsQmn0PQphfNzWqacMpred2yrmetGOEG_JvYxx5Scmu8w8Yg-3V7yhMeDsOh0DZ8sjTw5d-w3zKUNeU2IZzz5wvaJ7-8RRxyJqxFsUFaBv7WxUZ0bmWg4pRXdBUKNW53mEUGDigpRF6Fla-6wc4BCDhwfJWdpaixu8Lf4fkRKCs0Y4-lrsTH1-zwNkKBudbd6v4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwbKDA"
}
}
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3id.org/citizenship/v4rc1"
],
"type": [
"VerifiableCredential",
"EmploymentAuthorizationDocumentCredential"
],
"issuer": {
"id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
},
"credentialSubject": {
"type": [
"Person",
"EmployablePerson"
],
"givenName": "JOHN",
"additionalName": "JACOB",
"familyName": "SMITH",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
"gender": "Male",
"residentSince": "2015-01-01",
"birthCountry": "Bahamas",
"birthDate": "1999-07-17",
"employmentAuthorizationDocument": {
"type": "EmploymentAuthorizationDocument",
"identifier": "83627465",
"lprCategory": "C09",
"lprNumber": "999-999-999"
}
},
"name": "Employment Authorization Document",
"description": "Example Employment Authorization Document.",
"validFrom": "2019-12-03T00:00:00Z",
"validUntil": "2029-12-03T00:00:00Z",
"proof": {
"type": "DataIntegrityProof",
"cryptosuite": "slhdsa128-rdfc-2024",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw",
"proofPurpose": "assertionMethod",
"proofValue": "uqJPI9rTSZFuAXX9ib8DRWyqMHYB9UDLcPjtsvPg2F8YXSdxikxgpxgwM5WlJhw1Flwo5cbg-k489IM2iYoUjWlmwIp9lSAjbdm4eSd5yFiG8YVUhAdtql0AzFk4EYfJb6pQQlDQJ6m4ECkTd1oG1mxzdSZWXL910p6bwXjWWPZ-2LtuH26vR40u3tFeM1y1GIdtsqOiCgchAaDGGe12f_q-1d60yZwiyTEjC4O5lsCJ_P4ahN0DUQ_v2MObEYOCTGaG2zRaqkNIcbXXhjh31mMI8fb3S1LSyV3aMwiAmE9UdbcTA-O5JIsJf2bNZR_c3ehKzPvGNwLXdi3ufyTVcrazXRxVHJbC5PUnikvzHNUjdTGEc83i_BMbog71V8sKDmhgD4hflBm2nGDm8K91MtsrrWUWSU_oeUuPNkrvtN8V-ElAcW2TQUaazIlNazLISgR183cUmQn724i9icbflpgcKlfZ3nH8RYO2u0UZHnNUFNRQkuOEz7R2y9klpmKr-bVMl3Z8eaBOqIcQaBM_M-uDMqP4uP7B2EDdbXX1ukc9O2fIXrK4GykvCI88URhqA1hMZnV4K3dBlpCgiU4XU9wYJNSeghfo4-D1gJFoU7GienDgmq6lP-qn1HnWKwnb652aufVD8pL2aM-GTg4pUJfZNUGCOiKijtAQSo38arskxv9IC3NGo74ATzRsM6ZIpLU9s9KB2wCa8LHbVy1ZAIrSf8S_dH7IsfXkrc_pHjePTR-xatlH0kRLLWTbDFawRhlUFelI-TmLEmZm_ERNMxwBbCuHV4IuPDeFfTRhN1UDaFkN05PrVtLC-q4Yb8qrLH8S18My64SJa1mf0lobAglpwK--p9XTkNJdfSMU30i-djVWkd7Zar0clsJQP9SVPTYsH7WztqLqnmWL4YgmVKJ753fUeG3DdL-4ZcsD8o-1S7PGFbnnRvJwpcCF8nlKMSnpOqlZGq8eeuZyQ6PSxJ_WO2kW-Xp15Rvryn_VVCocNTQkjoo0e88xQEvqCE8dtrWvSY-ngK6qQ9dqLpZUCwWA4cXwlPJYRzOPBee2PMOkaQJPAAXIdHhAd096MK9-aDdquyTpoxc2EatT_Iy39KoxATxFxOseZah-D36VTTxwtEU4HO0LBUN_ddSO5R55BmOA70LkEaExSLxB4DhZfdQXhoMjKkTtG2YIoSEPX959du7yXsRyIDwp2Gdy3SdoxTDyP-VLaiEyC5hVut9rwBZRhnhETRZ1awX8Y9TobnkZs_qRTRtd8HftybqUrIebvABPhpmzEdeE2eBKP8PsM6u4UCBRw0p6d2t9xPODQjcEbOle_nSKPJHlGVl9xdg8CDjvRJoc2o7cDKtCeGPs_Y6jLnnQqPXAbRHayy517upEauA0LiCRTcAv6kYSMjcEPLn67wEfc3fti-EgBIG4q00F-rMdFb3mhRMB1ZnMNwddaxMeXabbwTxjaxCA7mArg0U3goldqJO8pHzy-ObnlDXArDlTx8YMyAWvB0c6WY7F9GIs4VckbOLoNMF0yVR5LDAJsL1LpROUVsM7fHQAI2jTh-6KVwFSEcXY0EnG0Isnr34npSeD0hXxc09SdfUzgl8XWHaILQmuI_OWq3m60uIKjvtzXkU56mKQKRgR5ARmEj_65iApDoQgpEe0JfSaqQJGnz2eCF1RHU-ZbsLl5G5oBayATl5CC77uKqpH2NnX5wqBsDV7UV6qgC__oRG7ykTogOw_ojqQ0pEUUaWAI-f1E1GpGF2zyZ7A4MxUghFvVW2rsoC6X01et5IBM6nwkCgk03J_uUurAKJUCeKCOoZJ_tLW_cV_aQLSII0SRUSqLY2k0AEMFjXI6gfY4-aV-pQmefmdOjXyiRZyS8LU_EHo52NMxsePzbstZ2TKFMOHZpQpW_H-Y-PWgr6mkQYH5436fztJuBhSqMF0SWYAECdjF7hOzyAAIHkkyDhhSYJhpPxftPHSxlE4tPalBk8jQvg6mXVrCGMW1gM2w04qfKAy4bwuQxWdHVG2hjaR8JBAIgEA5uLhUCI05QSCuzYvqc5-oEshwSiQiHeHupjCSViMN_Ri-2G8AbFkFekNKtUx0cryVMSsTSKq8XIn5NxngQfhNbHRmwhUmiqNeaVmqZ4KiXgXXzpFJibD-DdLfOKuH1E2cLPklQ1UUNozNDDA__YWvODGy8gRR7emCLxpVuaKP3XTUQZTATXtwCpdongbIWTf8MQ9FhaRssbYHc45F9UPMSzUGlIvyNUiiTypC8-gVQRDNeHkhhg6aG3huWvtso4m9RmiO1Yzma6ff5ib21eJAMJh-kjds-WEoQpKMcvSXXanvrKXPylvXkx4irUSezXkxM5SzxguPNRXz7m5XHIYi7TgZArXL09eE-zMl5Zdi3unvq4Uj8If512aeGWHtWUwQ-cHQX85FFizf7aQJy2vcBZjEXSvbEApSgB5uSy99dWNghZeK2zsH6xU6r1JYksxqTySl4HuM5T-HwpZsUI27WrJ9ztso1RNDXP6m6BcShtSJm1r9BoLrogLqANijcWdjuCre0cbzTmEGJ41igw3EQae_wvweWWhxM06IGOaj9WTU7rDykmF0oR-HV8w1ACi8xRgyOVy0_nREaVVln1BZZJqSHpPuMBuJjMMDvuY9AU-9e5aCRpYiHTpTT_k4c7T34DrUgyzA4K8nlmrjDbdgEtDDnqq0UB6rPEVUTZ3PD5efdPWd6lCMQtlXlDFURFpM7htw3RqNPI1MjQGDfir6_qTY-MRD9XiEFv-ec6S7PXj2RW9s9f8mmERaX_BDCJasRPBoQ0lGzaGgovCU20rf4YAjejw2ldw7x0cJINJQ5mx8RZqNyLyytYbioZLgXqtBm266P51cIpEb1_dwAdacTfhoHPohC2BJcHnQosLKTkqq1JlCHhcbpg5YP1mFjjs-jdqFJLGD69zD2ubDE-ImduGJqg6iWU1bSwoDa5yQgMZAT5GtXjOxhEUUdLFd-Rvuxe9OA-O_XiSSXH5A3sy5lxtTCuO1Gm9mR9gbxxwlkT3TsKkQTDUNPnk_KjptNk4NNiyjNMxrQ6E6YiX2xLNPTVr37kTb-BtGgo39FzrHczOQsYa-jlENcGk4SyfItIgVHfzemv0v4VtGVIRC5rVn8MuwRVI-tZLPVAwxMgFIv0O6D6rrndmIlWZq_4oh_CwmoNMsHbR6yOdoBhSa_7ig2lLOriru9sAia6-dU3eMNj4b0yD7Gf0NGJ2lQmaBozk3kHwv_9bQLxRclbgT-BzBtlKQeV0cj9zZTmbqUJG0CGqQg7chsbVa8gJnTqNEefdEdpX_lsmqAiqxDkcgShURhkPM3ctuVxau3Mgz2GKDuCQdzOZQsJqOUyio09IlGimX7ojkB_RVpSYPPZAyC6G7mP2rGrZDYk-GXy5o2LlG8zHoBYLEOzmvAsUDGbR-PQG5yDcQ6nGnmrozYKH2PLLKGI0Ur9ucuSy6BQm2QX51f_ng9yl3D8cXQfOD_E5pO85zs3I_r8KbZZU2Izq7dTlF-Vk71ne4kPA7bJsX9RulW93xEsRDoilCVtgqJB6R9_1kwk79jlcNaY2SvNjaGq49zaDjyhoeBupVkWV8uHtwJa-m8dv8-sWZmRZFGM-n1Cwt-gR6sTfvxtnezDntSwqpj8uUsG1eECsrIRI5Wjq_a0vcHUK2_R-Mm8EiYchgrgSBPVwzbae-yw_1Mvq1kcTynS_DmTcaqS3JLWypx9LjzgInn2be_9t96HLk7Gy9KWiNyxVV3dJaS1vwRLA8ff2r4Oy_xCdkAiXpssE-LUV_vU_zqpdEaJ6Cs8b9eCN6rjc_xhXf8bganch6jqCZCb-8cOr9vNYFzxeDODAvER4wGTvS1lmT3FZf5TcITyKpBeIwwK00ZwEj9n47-mS3zeAkc3C5wvuKaphaDoCmUDBBiP8LWku_oOnPygYAxNtHjrno0NKlcE2WVcqTSZ_V8B-YNl-PKjZfT1TnJ67nfo0cplsZL610ErqH2ws_3GPlEdQKie4I4-e_uYLoodHI3Uzt8D67WzwLePTFFFhLlzWBfbWo_t9UvcHgjZ00VMrwpSxzAMKgQYI2U-P9Rq_36aXabzWsiXUXxWFxDUMm_-sE_VfyHUNjfJpF6v2ejnYj2Fph5JoXh1OYNmvACjciqNWJKtSa8KoNAflBUqHOANh6F0mFLbB43thhGv0q-mo2sRJ8ecihZM1kyS_vLf0gDSu9o-vHW64vD0ueVZwPqnGOL7_jtMhb5hCt5kfvzr4w18KtyF6rxDn2YT1dYAVQ-hMfreFWTLWDu8-hCD40Ykmrg0bl4ls6Dtzoxtf79f9c64jiOA6n3OsVp0jfNCY7m5D6iXVHUW6qHsZDmMyqskc1QraJ-b9nkVLaf9UTAzWRnakW_HTLH_YTG64Lnr8jeFR8b2NGypI5XVUID-WYRQCw-2Ft1hywqrAVG3e9WVANPbxrFlhY6MN-jUpNlaKKZYrRdtIvjfa-rCuwfvZbqSk3XX4wfetJq5UPQaSst-yuc_O1EHFgVEPFQxE8UnWrMbcyPsfbGV4oKSzMeSQzUjmyBw98YnmFSo5GMzXcV6i3CpfHpMkpBd1Q-sQ1oZ1ofGwHWWklcPgLiwOoU5AQ4vxtH5EnjyEhOGIX_5yjaulHIBs_PNRzaC3kC89MhJLMFTDWYEh6M5jCqV70zny0EWiMc4l8vMiv72TmgdpQzihP0uUrchLMZIke_3uRQsSubsbcBZ5BL-GYHO7EPQ5w1zBI9UuG6wHQ1ALMryqP2vyz-ta3uiEa78tt_Py2PY9pRZavE9qWXDPWA0fQrSPIgaK1DAgsv2ZTbioVCiYCcPYl528iuKYwnr4ni412xp0gXZXXswVbaDHmtez7_vLizx-L5EDeYh4vVm59FdoZFd1vslv9rL_Kq3-D2-Zfv0U9qi5fEU0ItbGMxf8x_gVmsBKSkMfScc2v3zHi76FwwtighF08j9AFnxCsYwR6wK8l2aawgCSA6HxtSCsEaYcf-SyMTMtKZDchlh4qapaUz8HSLuGw7C_kVktbGgeqggDu-3sRr3nqi8fM_Eijago-B2_Z-cgN4lOKVErgmrKlRMdlP_S5viCxSMxPDOGRwk05deFA8RVEO83ZWkLkFkFAFyNL9z3AEx4AltH60rl_J31eUV_04x3s2GY0X7n3TN1K9rXh3h3MWFEJYxV46vlFG8w91H2vvNAOZTF2a5M8wMBLEyZvaMK72oSRd-J29xD69Ev8nZQOCtpQ73KZ2RiLP_BffF2GGv8ohoojTa_b06seXxlLZXh1331JjuZ-k4FEvyOEFYpQ5yV7fat_l3HDpangVRnL9IL-60c9oYFcUy5GZ83dbolMkd0oAPmIqChJSumwulIRRD3gfIp34KyOjYvoGAHDeiLO0m-LeZOsNv4dyi5KlifW-UXtL_K8chmFuPBeqbHhAS3gdomeI6tER9sHoOHg_iVEfDqlc91Qy0kVTO_yLPtX1wgZsitnl51fFBsoQOW2_OV4xpYXL26-0hzgS2PrOy8n11ccA8DE-T2l84wQ4wgnMs15ezAPGXLdzOMvvSCMOp5qbMNBIjz-FHMfkQVZTfwAjqMxS32dli2MOf-dOmGbV2n6MJcEUMIZ9mGPulpAgrJsR6j4xKPWn-RsRBrbK5cVHzsCPLT_7LqDkVp2YT47TNTaWCBTfH9PoT5huDb1t3uEMtN_iGEB0LoDlCWSI2H_Wkkr8XifcGf2NBYOTHXY7VZI9uNAUvW5U6lniFIxNjiFeccJCG_DPzAY7bO3XgWqtDzaFgDgDmCEf1ZFMXN5Fmu4GWfLv18V__mPvXYFu0NkAjVDVX2te8GZwcgc0SPoju8-RAlntfqFD4YFaoJXJ7Duwa0vAWazNWsSXq2muPQII_JFRVjmqF3zFe2JFZDCbAbiec1g_2zH5XXDFO1S7GVVsrphiec_MFFMA8t2vMzqVT9VLoufXreMq9tvQSA2gN7_MrSreH9bx9F3vpN3nh1wI1jd-RvgaOAbwIF1x6-Re7VVMassV1jqKE3CXyNiW2IjgOYpjbNilvcpAy4p-m3cpV5FGR0tERJSBeV5jeV4J3tWybFEvY_bqY2TsfSq_Poe3UIrr409YwcpLUaPvrqBdYE4eOB5iQG_R2-UvN9Wwt3SLaulG7jp9Xvh5fk2PHLaQ1F_xK1iZghBHRQzORhpTEaT4hTKJRwiMnku052jKM0IhyWsEx3wGYendvHEsJWfN5SGN7o3K2QOpRTGc39A_YcfcLuVYWWmFNhvg-tf-_RxwbPipzf7uyPCNNyZJ_yfkS4VNk-KIpM76nv4BYEdVfx5ngp6H7lbQIK0qE7gQbFamCZQFgQn8uqrA7JFZDZUPo03U0uRZe-weWt0OCsYYoyt4O2y4bItFv865DwQJqDzQQxiailXEP3kO22VR6TqnokBz5GYfigSudSRFsqlJaDUt-JeSBDwQHqnlPTvLU7Bx_PzOde20jAKGk78v7trSDv9rNo_aDYUeu8_PheED5C0dgXx0a6zmkU8aNMZoym5HDm8-7_DZQoWFAniblUGFXcFTn8qpezDEnFTFwtlcrDgHxdREAbfSMvoMoeTwe0U2cJPJFT51EB_RYxJR5qIyTDjp2IgzyyCuwEXh2tRKPdkX5QTZLVcy0rbC4TPQcgqkJogvkjnB-u8D0N5pmGiSf5U4LxUpAgXOI9-ThLQiwrDMxP3KAMZJoJiT2tiLzo34ajMfmviKQZDRy63Eoyvh5m19gJCWXXfOBXepCYEi2U_9aYYBSMTPb_19rn5pCaiK1G8fRzeammBtXr0Aa1bwPLVcNTv1rFbHKbn4S-OklXjd_-8JesA21wtVKbBFsahuoW-oaEyBMDA9vPNhz1cR6lmT1spqTxpgBDckFivTnjY4YTGWpXi9M7nirdVQiS4jUWugCGHLWI15wAJ2vAABqTp4AfolFBdGVauOn1Wc7MqVIZ2TCMRAiDnJvLMdCoXZ1toJwe65-AfK0_YXDoWCDieArF32Ggzs1oDDBQDKvhBy2AZFbJ4hAmvnhouiv1zHyMlUg0xHLxopyKtHnJshHWyB4z38YMCb_ee79ILJmFRA8ftSW7qvkAYst65-su6usGG15hiuLi3GwJ5ZZZoAuKUWtM7XB1_FIIgmDw-q3qUff3Z6YXK28ee1cp7azN66R-b94Z0y6igtRnu80xCThMUCZoDdePamuxf2LeEwB5PUIj-KHZbe7mB09OXyR-DF_SZR80Ncr6rB5f5psQQm6GvBfYnPIw3hfiYbx8a--OzWaqu3_-CZcJrcFrLZR0jN8_tialEEzFX_6ktbUCwtsMhDe6bs8u0G7qHH15NFm87l0ZXWo_BXVGyg_0yFFsEkXKk8kDWfTG0fW3xxg_CXfIYrywTO9BUyTqwdul0s-spSTJ_TXMz5MjwBO67BGNzlikVOTdXnUg6enkaA5F-Gonj-gfEaWh1tByNC5Ud5t-Jb2CJmgeZ1OP-0uWbg7LnoKaJF-gWo3M_Aga7dyUAvCnCn2nZycjYH9ehDQFHwPqeoyQdj40_F7nJH3Gxi0bw9JWVYZrLjHaDVW2exW6Lj7z-UhsklKKflmoii_L7kYNb-cJ8oqNaEXJyXnKmuj5w0ZCowM4xD1QxgUBaFlzxwDQCvR5IiC0oBqachjdx6bXadba2x4zVcXTakVQn-YOmbOkGkTKRC1doa5Sd846piUyC9TSGUEpbgXXgDRHyLenv-o-HLS20fILrp8fFjEJlpdxHIBHA7PQ2NZ55G1IfwvZPL4bgigNWOgJyh-kFS7Sbqtiyi9sZtKq45bJLw4IpUqubHiTvI2fUw13rWk-eTHOVZIHfWlV4WDsuYVJsrt0PgwoaVGt0HWpsTQcUWKkGP-0QmGqP8ghbO33p0awaBl5jDIROAACWOFqeFnAtQWcfEjlgPCEKAAjAMVroW46s5gi1JaeNxmMR9Ax4LA-A-NcgPManukGh6FPEXOrwl3kxca8nJJwQLTvEPIPqeKmg0mSbimkWbsXe_MnqgzCSyqIbksYx_HLGcXKw3sVX6kInw-xTK-UsJn5N-sJAYNrCJPJMoL9GopkF9aDrY1bkijGGFnY4Ube7Ac5Y9p3xVX7CUZ5PPYDQgihuvdVlPMdQvl3RiVft1np5RX6_PJPlFcSs6eCgs4Vj5o1MGwI_KvT7KRpEjnMr2B4_LxkKitCIopcCBjxGAjBQjno_ygJ3dhyQzM8UsWoJZDow_XxFOWKvlzieNGKkIb6SxsMYZHCVqKdO8XYV0LKqfKJTcArd2sA3xzP6FvpzV_L1s-3CRFXwHiOv6_U-ayumxRIt2Z6eQlLgeE0-jxBa9xPeMdw2VXlZtVssxLtX5_4gkZgXNt2Lge7Ev-CnI3uf-39-UdFm98oUrAdT031m8HMIgddwfRHVlAaO2ZmdxxoCGpAZy5XrhZuK9yW-u9kvrL5_wuFNGbiysVJpnB9TtKY7qj-PtAdIQTNi0aAgH14z2L7jEXtJCZfS2hASqyGX7nmh4iyUfnAkKfE7_NThadomJZ0om_W-CW2LMviCwNEHQDjW6dXzndgIJAcQyYy4auLBUFPXhfb3rBpGflatT5KGMYQ9N9_ep6VyFMvNcRBQnI-8JnmfTpQo687dIENkwFRPtia3idrAjOGr6r3m2kaqQu9Ya7GZmtvhX7N3ppIvc-RiLVM0OaBxo-491qRhjECNV_lunCezE5lHA5dtM2ha5NzXWtlz4t1WpeOD5GeWR3URGdYhVL0xuhU-X-9X6m1ilsYkMR7m7M5n2K9ebWW_koHUJ3SvdM0a6u12se3Jv82XTGxrrTamUrOS80y3-1ZWVgHZbyE_4XWrEO3WswJD40aEB1Yy7_WtM8B738RMuTZy8K8jLhRIKmXGMxYqhM-R6mEs-nSqvsKCf0FG8CyQUByqNIx6ITovaFkDGeiK0Se3-kaFzxZS3j0JypZgoOh-3I_4qcHbB_qJmB5P1LcLKBbEeRFG97uQPEBBTD5BwGV3518y0n6wA4H1NL-Y8GngmEKFaQ9ihdKtmZT_2EYI_LH-wge3jtWBrHnR-zkNR-VjtPBiDnBcGcQ38fnywUv3xqjpZ-10GgQ9ZZUqm2_oPa3bVo3Z7mxJq3hmLKnjCjsuzx7zbszNhdt3rmevknkPD601Redsd_7966RhDX44MPP-87KV8RxxjuWdkv7C3Eo46YmlWgxDb-yWwtHd9QWkwgvejSiE4K_CbaIYs9PueevqC1byTVD3JvuMGpuqfRAnsKdWtr2Ux5VL8go5zDEj1PTjjG8IctMoTZ7wTM6GLV84DaEMlr83Shs6NZqbR_fw-oQwIRSEbN0f0Zn-_q67xV0XWNExaYYz5DJm3nq1xpkNr1etEizXCPh2loYjMDHGrJbq3I-VikB3lutUOoe3hP6mZhNQ_PvMXVIXdOFtGhsbyUQKdo0kUssBnAIKikGfVc82Sy6NCRaZSmx-R-PTWfg1OL9H0fhz9Gw-bqPPOcxv21d9BNKdiKWIOBtWGeW6oqqiF0mGFwxcMeZwqjVQTZTzprLEO8akCQP892-1eM302f102bukztpzn-bP1QV9HeLfAeFsrRy5YngxAqQ95Kkmsx71sxoOxbN5d1CMfdMAXeacXU4VJJeezeaVCqDKoI1fmxjorL46yI7sDtQEPr69tNr_p-VMjcB1ZFwI-RnK3iUL9qLsm3bEDHpD0rIZHNl0AdEHABbtQRgT7OK0SPTH7STUIY_Axqd0Lhou2mtVf-CKfYgZ5LUYVjhdiYi4pUfZL_RJHc7DBAhuIgJtWeZTAeCWLOz-cwkTyMdW4UfW7BA7T2vr5P5jlhtr6bx-I9gwP4Q5HzdD21dHuunE1NwSdnpmZqco417zRDWtGhIOyJRkJGOMgSaPXeKrGBfgK9NqE_kWbnlV8Yjz3VFUsPKX0gpZncl0i291hHOcO5lJstb-cW0J-iQiXOKlaR6wzAubyi89t3BQHGZ8kgd5iI4rsDzn6dDkAY9Y-W7ROhGoUwy-3fVEF9iNl90Qzv904GPkepYWkzba7U8rGvb3yTAkfPecfB6ur2lHZlhuhQPry1Gxy2YfacgQWwr5VmhChKaEeccmL_L1mJjSKT3rEPnzisld2D20QBxt6XatRympMGNyqFpWfSfQFvLtlEkVH87TejqUaMGRrbA3b3M5M_fWbuOpXXqvye5DlcB_PG3eIe7lIAt7HSBw7NV6t7z3WqD79r2KycyKngkm3WdiPrEA8zZIPvFIs8sXGhKj33GBpxwgMmdSlD3tydCMgaZ-OqkypCOUG8pMU1P0fcw5nY8ZU-4HkFYsScqz1dM74cAVevDRofWE9NPD1obItClPfOvSJZ2tL791xW3lakktIXS7JYmPQ2ATWTKtuUbIsx2VZdSA3HcHoFEcWXDNgxnVcYSwdNlA-ucc41GVd1nL2QHpi1moIzxYWWE1uA2Eg4PmNJ1XcSc"
}
}
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3id.org/citizenship/v4rc1"
],
"type": [
"VerifiableCredential",
"EmploymentAuthorizationDocumentCredential"
],
"issuer": {
"id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
},
"credentialSubject": {
"type": [
"Person",
"EmployablePerson"
],
"givenName": "JOHN",
"additionalName": "JACOB",
"familyName": "SMITH",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
"gender": "Male",
"residentSince": "2015-01-01",
"birthCountry": "Bahamas",
"birthDate": "1999-07-17",
"employmentAuthorizationDocument": {
"type": "EmploymentAuthorizationDocument",
"identifier": "83627465",
"lprCategory": "C09",
"lprNumber": "999-999-999"
}
},
"name": "Employment Authorization Document",
"description": "Example Employment Authorization Document.",
"validFrom": "2019-12-03T00:00:00Z",
"validUntil": "2029-12-03T00:00:00Z",
"proof": {
"type": "DataIntegrityProof",
"cryptosuite": "slhdsa128-jcs-2024",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw",
"proofPurpose": "assertionMethod",
"proofValue": "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"
}
}
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3id.org/citizenship/v4rc1"
],
"type": [
"VerifiableCredential",
"EmploymentAuthorizationDocumentCredential"
],
"issuer": {
"id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
},
"credentialSubject": {
"type": [
"Person",
"EmployablePerson"
],
"givenName": "JOHN",
"additionalName": "JACOB",
"familyName": "SMITH",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
"gender": "Male",
"residentSince": "2015-01-01",
"birthCountry": "Bahamas",
"birthDate": "1999-07-17",
"employmentAuthorizationDocument": {
"type": "EmploymentAuthorizationDocument",
"identifier": "83627465",
"lprCategory": "C09",
"lprNumber": "999-999-999"
}
},
"name": "Employment Authorization Document",
"description": "Example Employment Authorization Document.",
"validFrom": "2019-12-03T00:00:00Z",
"validUntil": "2029-12-03T00:00:00Z",
"proof": {
"type": "DataIntegrityProof",
"cryptosuite": "falcon512-rdfc-2024",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key:urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k",
"proofPurpose": "assertionMethod",
"proofValue": "uOaRP1-nFR8VyHyVk7XBNRw9LaVadAR2LUiAvPtrL-oeD8MqMhzOgwyHjJaFjT-8Q16axhq9UE9t2O3hyis_Cpv3g2W5c6h2CJI1KaM-GCDUw3M-x7MMZZkjybtKKE4actl-bM07Q4bTsUSLpUNF74-bVu8qFBRVz0cPX_nzgpF1tj6rIgz2gN3Z84_2szrv6ZE6ryVixTZ78189YM1YkP-lSz-PRdqTuSSXlYlCn8l6JovTX_c38aTxUqMqmie4xfSbIiwqtCRCKLnhdk39lO4qrUzlJ1lKFg4FVXG5lpw7Ml3XavW3jtTZyg-7C2jfQ_nLrJid-Cd0AI96NZzZMjvhnJ81kpXuTDF7lZ8RgTldLYQjUGF2xF6M5u07CuuyZFJnVxa4WD5bZy9I1pGfPfMdyLrw0NaSGnrXJ0eI2alZtfIcRBBYIzWZNKxPfmuIKygkE0GhO4nuGoT-pdD3mrHY0Jccy5zXZHU5OyfjDmiXfDzfnevxr7g2i48N1RnsPSTzxeuzZBee-Bh3Y1EONJ_fh65IypECZq1AUmVPDINMohwZp3JXZSKdnuJqfOaLh5rHXGQ5OOVDGYRT7q_-WxDBnF6_Rh3EwaK7_W1T1qF43LxzAoTYdmVpIatmUg6-HfWAPRmNeYA_Fg21n5PPxZPoqhAbQiRFvDWJPiFJRlQvEkps4qeqIB8ajsda36xOnMfWeHaMJYBz8tsHmi9L9dnpuJRw-39QqU0uBRfifx_txgclejBNZBUQYN1_1sUcW9uZIa0UHiOpAO9z8TkaFWqZ9Zz34a9vW5XuSZ_LVDy283GtVtmia9uoO0euV9xo23E4n_zmU9Sa83LMnisuYZompo0NYVtPhsN_CykPKmsAAAAAAAAAAAAAA"
}
}
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3id.org/citizenship/v4rc1"
],
"type": [
"VerifiableCredential",
"EmploymentAuthorizationDocumentCredential"
],
"issuer": {
"id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
},
"credentialSubject": {
"type": [
"Person",
"EmployablePerson"
],
"givenName": "JOHN",
"additionalName": "JACOB",
"familyName": "SMITH",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
"gender": "Male",
"residentSince": "2015-01-01",
"birthCountry": "Bahamas",
"birthDate": "1999-07-17",
"employmentAuthorizationDocument": {
"type": "EmploymentAuthorizationDocument",
"identifier": "83627465",
"lprCategory": "C09",
"lprNumber": "999-999-999"
}
},
"name": "Employment Authorization Document",
"description": "Example Employment Authorization Document.",
"validFrom": "2019-12-03T00:00:00Z",
"validUntil": "2029-12-03T00:00:00Z",
"proof": {
"type": "DataIntegrityProof",
"cryptosuite": "falcon512-jcs-2024",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key:urCQJjNUc-k6X0bvWIxp2p3VqhYLhiZ7dAxp1O4sgNX5mEBNFZ3iYopETaw3ZUtHfZbycHmQl_Rjgj1-cUNpQeAwYl2gW9QYtQCQBT1DdocpQxApos-ZLBpqvGcvGHxnKUlrugOYXwe_4LpOkhLIMAsXeiSTVPaXVmii_cruYp98AE0WVFU6hpbnNlCOKBkxFqdW19QZ8qR51qoJqMKGeTIqmJCF50I2CsCm2eRq60JUcN7dk3cazXoMtKU_YOA8vA_2X2qNPHrhpuXtPw4Qbom0mOandM51FO47rakCoGMgXg7l_vcC38KvDkKyIJPsnpbzmiDoJZK9iWYdGCiruOZlx8VMDqpyd7shQYXw5njUi5Z0DOZU8Kk9MFiiG9PwAAMcdad9nfFEGTaD7sjfV4BIcBzWE4H4euWenzpbvnERQN2RtsnM-SZo9zWQdljcRZyBeYkD8MIDrkk1Z05njmgw_IK4jgludKBj7ihrEzlOaq8mxLEOi_P3q62F5mgRm8FnG-GexQZQDbjGqzcPSJGw9kEo3sB7g2A3s97iszIxQoSrna8Rdl3r6mdWX-TIydwqLIRGhrfJhKk8XQnrXyt1SySEEG6YM2ON2oVy1E1Nxv36rYoRc379Fp-OtYcCwWn1nTMayRq07p8wHqJ9OncHi1ytgTQN7myPxHzzqhyvue7BkzDEcUy25bfmhQicmTy3Upw1IgDrJXMKrb68t1aJ1Ypc5nAI1kfscrSbAAOCDwUSgNTbpL2mQhhaRNSnRlXCRNcptbn9d7TkCcO7yDBQdgeDrtlT5K0nDISZJsPNGCk0nNU2sgZwH2mbqfdaEGoNSYPE0eRCRpbJYloZrx7rlx7MVxteToF7iGNsjLqEGNTjiuG_AXxWXmuS1bSbLtEThADQUdjymUzDkarmbH_xY4X13f-KCUejGl8YEmFw60imKKBmpvaklKYnTNYjN5_WR8mYihBDiqbApYumnQCM7vIQDGuOFsxW5vGkeiWKYnPmw94brGf3q9E6SOSlFTGHiw_KdthKAAA3UYv6axebtIxl2KtHDzSqnSV4FrBI8JRSn2MhrP5VYnXh9nA9F3eEUx-Eme6JOZeIZGpde2dXXxg2sSoVFP1eNNkZhBf1lu414-KI41p8rDeuagkSekThSi7sdxzeF49bMiN1zJg3aNgEfQ0Fhm8Wm7TdNVeowG8k",
"proofPurpose": "assertionMethod",
"proofValue": "uOQsNa2vrNpLO7zr2FtOMZELtKKrlLkihlXOTLzkXam8svZ29h9-XHfqDGW8cWX257d9GlpnxlV1ZjDoI4_R1aXk6jxxWsVSnZJEGy-NiMtZI5UHhwK_dvLGHZj4RfHXvQTKCSzKNcW0t6BM-g2itNcQTUmLVxHV9fhvfl85DtpvtUEoeE9Zh8snDTKHcZ5AGD7hQHAT1x4YbHOTGWdLFm1IFwvRBKulmBisAh-vqujSt86IkvGQyq4OItE1upZtydy7r8ZXhY97_RrXTPJgUum-zLDK8O1HiwiNx5htjBbiJGmv3lXma2XaG95DRrN5SDQCLx1CcmYmRMfqL7TS0v_6MuKDyFiQfGkJJZm4nMTKTBi846HJrpBbXVrFb_ZC0n06v-75nVxi76ATR94JqMJW2c7CeWboU_LEuvbhMNzyoMpUDf0hIdx2tbLop5tOwc3psxTzMbpLu3q7CtNL3D88CODS7uT86DMhKzY_xMYAVLOHXqKnYHGbGshmUal7A6keM2FMoeuc1fHgStter_lxSpZ7nkOxVEEs1smCJCErr0FwlNG47Ased1h28rJo6EdyWYthIM3EyoTkQ3tFa4UnlZzdxYqDvSMLTqCFXRi9p-qdLYr2k-yNiWjdMEM27lv1dlg5wR6NJwjE5BmONxkgYfSOdeVhQOCOgR2VZmuNiQFwBO3cko5lcwRNFClvF2qcDqKzIKrzquZIz4xZaJml8fe57TOoVKmDQluRSdlJlPxygZwwSJUmvIATKv0RjJw-jkJrxFu8n73Cqof_VVU2wOO6e1ii2SRtW_U5ikGXlae39Vmxan2I6LEFwN9pu9V0JcMx7dPkj2vuTvwjMOk_1sIBvnZjVHsjW09JGKTGAAAAAAAAAAAAA"
}
}
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3id.org/citizenship/v4rc1"
],
"type": [
"VerifiableCredential",
"EmploymentAuthorizationDocumentCredential"
],
"issuer": {
"id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
},
"credentialSubject": {
"type": [
"Person",
"EmployablePerson"
],
"givenName": "JOHN",
"additionalName": "JACOB",
"familyName": "SMITH",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
"gender": "Male",
"residentSince": "2015-01-01",
"birthCountry": "Bahamas",
"birthDate": "1999-07-17",
"employmentAuthorizationDocument": {
"type": "EmploymentAuthorizationDocument",
"identifier": "83627465",
"lprCategory": "C09",
"lprNumber": "999-999-999"
}
},
"name": "Employment Authorization Document",
"description": "Example Employment Authorization Document.",
"validFrom": "2019-12-03T00:00:00Z",
"validUntil": "2029-12-03T00:00:00Z",
"proof": {
"type": "DataIntegrityProof",
"cryptosuite": "sqisign1-rdfc-2024",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key:uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw",
"proofPurpose": "assertionMethod",
"proofValue": "u95i_VB8BTjvSCWVS68r0ynhLsxmRRxQ_NNhVq-PfGgMlEWkk2Wiw1dqpNwu3dy0m0fDGrgKtmAHpI-BTH3SyAgAHm2POTk4LZNQxFSgScJc1jhuWKiN5Fb6ntg-5RN-X0v_f9kPcgti85_89Ns7ZU5ul33rcY4HzkiP0vdDSMnuoQsWlzZ6kwQOY-cr8DlzgOAEREQ"
}
}
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3id.org/citizenship/v4rc1"
],
"type": [
"VerifiableCredential",
"EmploymentAuthorizationDocumentCredential"
],
"issuer": {
"id": "did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="
},
"credentialSubject": {
"type": [
"Person",
"EmployablePerson"
],
"givenName": "JOHN",
"additionalName": "JACOB",
"familyName": "SMITH",
"image": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==",
"gender": "Male",
"residentSince": "2015-01-01",
"birthCountry": "Bahamas",
"birthDate": "1999-07-17",
"employmentAuthorizationDocument": {
"type": "EmploymentAuthorizationDocument",
"identifier": "83627465",
"lprCategory": "C09",
"lprNumber": "999-999-999"
}
},
"name": "Employment Authorization Document",
"description": "Example Employment Authorization Document.",
"validFrom": "2019-12-03T00:00:00Z",
"validUntil": "2029-12-03T00:00:00Z",
"proof": {
"type": "DataIntegrityProof",
"cryptosuite": "sqisign1-jcs-2024",
"created": "2023-02-24T23:36:38Z",
"verificationMethod": "did:key:uriThRL3yRH1lFwBzv4bD4tJB_pxqquMGXB1_Sj0PPOEDA92Z4Lgd7E-FvKH-Xs-hLtL4wvW8WL11G3sUMdhkDKgDCw",
"proofPurpose": "assertionMethod",
"proofValue": "uI2_222exFq1NXg8hWMFsENbhQp17XWsPzc8xU0VJIwJY6bIcqOdHmEpmqHRysXP9dPS0ML6ZeeVlT5tNsRyFBAAAGBvscX1D4zKjDbhhFNEuFW0RyKBxRaUoCxzpZzh_Iq-LmCsVLQ8WDQhygTQQTbwWo20zi112MzNTOMU3H6zUZId2q-mRjpZtuzaxjY_QcwELBg"
}
}
This section is non-normative.
This section contains the substantive changes that have been made to this specification over time.
Added cryptosuite algorithms for Stateless Hash-Based Signatures, Falcon, and SQISign.
Referenced in:
Referenced in: