Verification Flow
Verification is the process by which a Verifier cryptographically validates a Verifiable Credential or Verifiable Presentation.
Verification Flow Overview
Proof Request
A verifier initiates verification by sending a proof request to the holder:
This follows the DIF Presentation Exchange v2 format.
Verify a Credential
Request
Response
Verify a Presentation
Request
Response
Verification Checks Explained
1. Proof Integrity
The cryptographic signature is verified:
- Resolve the
verificationMethodfrom the issuer’s DID Document - Extract the public key
- Verify the signature over the canonicalized credential data
2. Issuer DID Resolution
- Resolve the issuer DID from the ADI blockchain
- Confirm the DID is not deactivated
- Confirm the verification method exists in the DID Document
- Confirm the key is listed in the
assertionMethodrelationship
3. Schema Compliance
- Fetch the schema from the Schema Registry
- Validate
credentialSubjectattributes against the schema
4. Expiration
- Compare
expirationDateagainst current time - If expired, the credential is invalid
5. Revocation
- Query the Revocation Registry using
credentialStatus - Check the specific
statusListIndexin the StatusList2021 bitstring - If the bit is set, the credential has been revoked
Selective Disclosure Verification
For BBS+ credentials, the verifier receives a derived proof:
The verifier only sees the disclosed attributes (type and university), but can verify they were part of a validly signed credential.