user has no means of sharing the partial data with the verifier

organizations.

Using Decentralized Identity (or DID) approach, we can create an

ecosystem where Issuer, Holder, and Verifier can achieve their goals

with utmost safety, security, and ease of use. As shown in Figure

17.6, the flow can be broadly explained in the following four steps:

1. The Issuer and verifier organizations create a pair of

private/public keys using Cryptography as well as a public DID

on Blockchain that is visible to all. Issuer then issues a VC to

the user that the latter stores in their own mobile device. The

Issuer also signs the VC with their own private key and writes to

a public Blockchain.

2. The user, on a later day, can share the data with a third-party

Verifier organization.

3. The Verifier matches the VC against the reference data signed

by the Issuer on the Blockchain.

4. If on a later date, there is a need, then the Issuer simply

revokes the VC by updating the reference data Blockchain. The

Verifier can again check to know that the VC is no longer valid.

Refer to Figure 17.6, as follows: