1 Overview ........................................................................................................................ 32 | |
1.1 |
Introduction .............................................................................. Error ! Bookmark not defined . |
1.2 |
Purpose ............................................................................................................................. 33 |
1.3 |
Structure ........................................................................................................................... 33 |
1.4 |
Audience ........................................................................................................................... 33 |
2 Background on verifiable data sharing technology ........................................................... 34 | |
2.1 |
Introduction to Verifiable Credentials ................................................................................ 34 |
2.2 |
Public Key Cryptography ( PKC )........................................................................................... 35 |
2.3 |
Hyperledger Indy ............................................................................................................... 36 |
2.4 |
Digital Wallets for Verifiable Credentials ............................................................................ 36 |
2.5 |
Motivation to use the VC technology ................................................................................. 36 |
4 Core Approach ................................................................................................................ 38 | |
4.1 |
Mapping TSX for PCF participants ...................................................................................... 38 |
4.2 |
Trust Assumptions for TSX for PCF ..................................................................................... 39 |