user has no means of sharing the partial data with the verifier
organizations.
Using Decentralized Identity (or DID) approach, we can create an
ecosystem where Issuer, Holder, and Verifier can achieve their goals
with utmost safety, security, and ease of use. As shown in Figure
17.6, the flow can be broadly explained in the following four steps:
1. The Issuer and verifier organizations create a pair of
private/public keys using Cryptography as well as a public DID
on Blockchain that is visible to all. Issuer then issues a VC to
the user that the latter stores in their own mobile device. The
Issuer also signs the VC with their own private key and writes to
a public Blockchain.
2. The user, on a later day, can share the data with a third-party
Verifier organization.
3. The Verifier matches the VC against the reference data signed
by the Issuer on the Blockchain.
4. If on a later date, there is a need, then the Issuer simply
revokes the VC by updating the reference data Blockchain. The
Verifier can again check to know that the VC is no longer valid.
Refer to Figure 17.6, as follows: