Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Agora
  4. Verifiable Credentials & Decentralized Identifiers (VC/DID)

Verifiable Credentials & Decentralized Identifiers (VC/DID)

Portable, privacy-respecting identity proofs for civic services.
Back to AgoraView interactive version

Verifiable Credentials and Decentralized Identifiers represent a fundamental shift in how individuals prove their identity and qualifications in digital civic systems. At their core, these technologies enable people to hold cryptographically secure credentials—such as proof of residency, professional licenses, voting eligibility, or benefit entitlements—in digital wallets they control directly, rather than relying on centralized databases managed by government agencies or third-party providers. The system operates through two complementary standards: Decentralized Identifiers (DIDs), which are unique identifiers that individuals or organizations control without requiring a central registry, and Verifiable Credentials (VCs), which are tamper-evident digital documents that can be cryptographically verified without contacting the issuing authority. When a citizen needs to prove eligibility for a service, they present only the specific credential attributes required—for instance, confirming they are over 18 without revealing their exact birthdate—through a process called selective disclosure. The verification happens through cryptographic validation rather than real-time database queries, meaning the issuing agency doesn't need to be online or even aware that verification is occurring, fundamentally decoupling identity assertion from centralized surveillance.

The traditional model of civic identity creates significant challenges for both governments and citizens. Centralized identity databases present attractive targets for cyberattacks and data breaches, exposing sensitive personal information of millions of residents simultaneously. Citizens must repeatedly submit the same documents to different agencies, creating administrative burden and increasing the surface area for identity theft. Furthermore, many civic services require real-time access to government databases for verification, creating single points of failure and raising privacy concerns as agencies track every instance of credential checking. Verifiable Credentials address these problems by shifting control to individuals while maintaining the cryptographic integrity that agencies require. This approach enables new models of civic service delivery where private vendors can verify eligibility for government programs without accessing centralized databases or learning unnecessary personal details. It also supports cross-jurisdictional recognition of credentials, allowing a professional license issued in one city to be verifiable in another without complex reciprocity agreements or database integrations.

Several governments and civic organizations have begun piloting VC/DID systems for specific use cases, with early implementations focusing on educational credentials, professional licenses, and proof of residency for accessing local services. Research from digital identity initiatives suggests that these systems can significantly reduce administrative overhead while improving privacy protections for citizens. The technology aligns with broader trends toward self-sovereign identity, where individuals maintain greater control over their personal data, and zero-knowledge proofs, which allow verification of claims without revealing underlying information. As concerns about data privacy, surveillance, and centralized control intensify in democratic societies, VC/DID systems offer a pathway toward civic infrastructure that preserves both security and individual autonomy. The challenge ahead lies in establishing interoperability standards across jurisdictions, ensuring accessibility for populations with limited digital literacy, and building public trust in systems that fundamentally reimagine the relationship between citizens and their credentials.

TRL
7/9Operational
Impact
5/5
Investment
4/5
Category
software

Related Organizations

Decentralized Identity Foundation (DIF) logo
Decentralized Identity Foundation (DIF)

United States · Consortium

100%

An engineering-driven organization developing the technical specifications and standards for decentralized identity.

Standards Body
World Wide Web Consortium (W3C) logo
World Wide Web Consortium (W3C)

United States · Consortium

100%

The international standards organization for the Web, responsible for the Decentralized Identifiers (DID) and Verifiable Credentials (VC) recommendations.

Standards Body
European Commission logo
European Commission

Belgium · Government Agency

95%

The executive branch of the EU, responsible for the AI Act.

Deployer
Government of British Columbia logo
Government of British Columbia

Canada · Government Agency

95%

A provincial government that launched the OrgBook BC, a verifiable organizations network based on Hyperledger Indy.

Deployer
MATTR logo
MATTR

New Zealand · Startup

95%

Provides a platform for creating and verifying digital credentials, contributing heavily to JSON-LD and BBS+ signature standards.

Developer
Spruce ID logo
Spruce ID

United States · Startup

95%

Develops decentralized identity software, including tools for verifiable credentials and ZK-based authentication.

Developer
Danube Tech logo
Danube Tech

Austria · Company

90%

A company specializing in decentralized identity software, maintaining the Universal Resolver for DIDs.

Developer
Hyperledger Foundation logo
Hyperledger Foundation

United States · Consortium

90%

Hosts Hyperledger Indy and Aries, the open-source frameworks that power a significant portion of global SSI projects.

Developer
Privado ID logo
Privado ID

Switzerland · Startup

90%

Formerly Polygon ID, providing Zero-Knowledge (ZK) identity infrastructure for verifiable credentials.

Developer
Transmute logo
Transmute

United States · Startup

90%

A company applying verifiable credentials and DIDs to supply chain security and trade documentation.

Developer
Dock logo
Dock

Switzerland · Startup

85%

Provides a full stack for issuing and verifying decentralized identities and credentials.

Developer
Gen Digital logo
Gen Digital

United States · Company

85%

Parent company of Avast, which acquired Evernym (the creator of Sovrin), consolidating key SSI technology.

Acquirer

Supporting Evidence

Evidence data is not available for this technology yet.

Connections

software
software
Zero-Knowledge Identity Frameworks

Proving eligibility without revealing personal data.

TRL
7/9
Impact
5/5
Investment
4/5
hardware
Privacy-Preserving Proof of Personhood

Hardware-based sybil resistance without identity disclosure.

TRL
5/9
Impact
5/5
Investment
5/5
ethics-security
ethics-security
Sybil-Resistance Mechanisms

Preventing fake identities in digital democracy.

TRL
6/9
Impact
5/5
Investment
5/5
ethics-security
Consent Management for Civic Data

Granular, revocable control over personal data in public systems.

TRL
6/9
Impact
5/5
Investment
4/5
software
software
Content Provenance & Authenticity Signaling

Cryptographic provenance metadata for media integrity and trust.

TRL
6/9
Impact
4/5
Investment
4/5
software
software
End-to-End Verifiable Voting (E2E-V) Protocols

Cryptographic voting where voters and observers can verify outcomes.

TRL
6/9
Impact
5/5
Investment
5/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions