Extrimian – Incucai | Demo

4. Detailed Implementation Flow

a. Issuance of a Verifiable Credential (VC)

Credential Generation:

The INCUCAI system generates a credential for a new donor or recipient.

Example Credential (JSON):

{ "@context": ["https://www.w3.org/2018/credentials/v1"], "id": "http://example.edu/credentials/58473", "type": ["VerifiableCredential", "HealthCredential"], "issuer": "did:quarkid:zksync:EiAk4oH7kW_zdptvfljmROrQXfAND_-xcDXr-edThPNsCw", "issuanceDate": "2024-07-11", "credentialSubject": { "id": "did:quarkid:zksync:EiBHFro5XFyUOsJYfr8LmYCiGlITiFhBpICA0aqxpxvfGg", "name": "John Doe", "healthStatus": "elegible" } }

Signing and Verification:

  • The credential is signed using the issuer’s private key.
  • The signature is verified to ensure that the credential has not been altered.

b. Presentation and Verification of a Credential (VC)

Presentation Request:

  • Bob (verifier) requests Alice (holder) to present her health credential to verify her eligibility.
  • This request is sent as an encrypted message via DIDComm.

Credential Presentation:

  • Alice presents her credential to Bob through her digital wallet.
  • The credential is sent and automatically verified to confirm its validity.

c. Interaction through DWN and WACI-DIDComm

DID Resolution:

  • Alice resolves Bob’s DID to obtain the URL of his DWN.
  • She uses a DID Resolver such as Extrimian’s Modena component.

Secure Message Exchange:

  • Messages between Alice and Bob are encrypted using DIDComm to ensure privacy.
  • The DWN acts as a secure mailbox to store and retransmit messages.