Protocol Overview
Cardano VCR defines a protocol for verifiable credentials on Cardano. The protocol maps the W3C Verifiable Credentials Data Model 2.0 onto MPFS cages, using Merkle Patricia Tries for credential storage and proof generation.
The problem
Digital credentials (diplomas, licenses, certifications, medical records, KYC attestations) are currently managed by centralized systems. Holders do not own their credentials. Issuers can silently revoke or alter them. Verifiers must contact the issuer to check validity.
The W3C Verifiable Credentials standard addresses this by defining a three-party model (issuer, holder, verifier) with cryptographic proofs. Cardano VCR implements this standard on Cardano.
Design principles
Authority-issued credentials
Credentials are meaningful because an authority stands behind them. A university issues a degree. A government issues a passport. A hospital issues a medical record. The W3C VC specification reflects this — issuers are authoritative entities.
Cardano VCR embraces this model. Each issuer operates their own MPFS cage and controls what credentials they issue and revoke. This is not a limitation — it is the correct model for authoritative credentials.
Verification over creation
The value of a credential lies in its verifiability, not in the ease of creating it. Cardano VCR optimizes for the read/verify path:
- Any Plutus validator can verify a credential via a reference input and a Merkle proof in the redeemer
- Any off-chain entity can verify a credential using a proof bundle — no Cardano node required
- Proof of non-membership enables revocation verification and non-attestation proofs
Decentralized trust
No single entity controls the protocol. Schema authorities, credential issuers, and verifiers are all independent. Verifiers choose which authorities and issuers they trust. The protocol provides the cryptographic machinery; trust is a social and policy decision.
Protocol layers
graph TB
subgraph "Schema Layer"
SA1[Schema Authority A<br/>Government Standards]
SA2[Schema Authority B<br/>Industry Consortium]
SA3[Schema Authority C<br/>Individual Researcher]
end
subgraph "Credential Layer"
CI1[Issuer: University]
CI2[Issuer: Hospital]
CI3[Issuer: Employer]
end
subgraph "Verification Layer"
V1[Plutus Validator]
V2[Mobile App]
V3[Web Service]
end
CI1 -->|references schema| SA1
CI2 -->|references schema| SA1
CI3 -->|references schema| SA2
V1 -->|Merkle proof| CI1
V2 -->|proof bundle| CI2
V3 -->|proof bundle| CI3
Schema layer
Independent authorities manage schema registries. Each authority runs its own MPFS cage with its own policy. Most authorities operate in append-only mode: schemas, once registered, cannot be modified or deleted.
See Schema Authorities.
Credential layer
Issuers manage credential tries. Each issuer boots their own MPFS cage. The cage token owner is the issuer. Credentials reference schemas from the schema layer. Issuers can revoke credentials by deleting them from the trie.
See Credential Issuers.
Verification layer
Verifiers consume Merkle proofs. They can be Plutus validators (on-chain) or any entity capable of hash computation (off-chain). Verification requires no blockchain interaction — only the proof and a trusted root.