Use when working with PID Rulebook design decisions. Covers PID attribute selection, encoding choices, namespace design, and format-specific considerations.
Version 1.2, updated 30 March 2025
This document is the Discussion Paper for European Digital Identity Cooperation Group regarding Topic V: PID Rulebook
Risks considered in [Topic_A] are also applicable here
This document uses the capitalised key words 'SHALL', 'SHOULD' and 'MAY' as specified in RFC 2119, i.e., to indicate requirements, recommendations and options specified in this document.
In addition, 'must' (non-capitalised) is used to indicate an external constraint, for instance a self-evident necessity or a requirement that is mandated by an external document. The word 'can' indicates a capability, whereas other words, such as 'will' and 'is' or 'are' are intended as statements of fact.
Currently, W3C VCDM 1.1 is referenced in the implementing acts, though it is understood to be a placeholder pending a final technical decision. This is because, in its current form, VCDM 1.1 remains an incomplete framework, lacking the necessary specifications to fully support the implementation of an EUDI Wallet.
To finalise the list of requirements and related technical specifications for implementing the PID based on the current ARF approach—which envisions issuing the PID in two formats:
It is essential to fully define this second format by detailing all relevant aspects.
A clear and well-defined set of requirements and technical specifications for these components is crucial to accurately describe the PID and provide implementers with a robust framework for developing Wallet solutions.
In the current ARF, the decision leans toward adopting JWT-like Simple Attestations, which offer a simpler and widely compatible format, complemented by the SD-JWT-VC draft, but still several details are missing. Ongoing discussions emphasise the need to balance flexibility, interoperability, and security while avoiding unnecessary complexity.
The topic of attestation formats and data models has been a long-standing discussion within the expert group. Over the past two years, it has been extensively debated among Member State experts, reflecting both its importance and complexity.
When discussing verifiable attestations, at least four key aspects must be considered:
There are at least three main families of attestation formats, each with distinct characteristics in terms of structure, flexibility, and implementation requirements:
These standards define highly structured specifications for:
They are designed to ensure strict interoperability and security, particularly for official and regulated attestations, such as:
These specifications provide clear, predefined guidelines on how attestations should be issued, stored, and verified. However, they leave little room for flexibility, prioritizing high trust and compatibility across different systems.
Compared to ISO/IEC-based attestations, this category:
For example:
While JWT-based attestations offer simplicity and widespread adoption in web authentication (e.g., OAuth2, OpenID Connect), they lack built-in advanced cryptographic proof mechanisms unless extended via additional specifications.
This category is like JWT-based attestations in that it is JSON-based, but it provides a fully-fledged, and extensible data model for verifiable attestations.
The W3C Verifiable Credentials Data Model (VCDM) defines a general data model, offering a high-level structure but leaving many technical aspects open for further definition, including:
Key Features of W3C VCDM:
To implement W3C VCDM-based attestations, separate specifications are needed for security mechanisms and signatures, such as:
These mechanisms offer different trade-offs, allowing PID Providers or Attestation Providers and Relying Parties to choose the appropriate security model based on their privacy, interoperability, and trust requirements.
SD-JWT (Selective Disclosure JSON Web Token) is often mentioned in discussions related to W3C VCDM, but it serves a different purpose:
Thus, W3C VCDM and SD-JWT are not competing approaches—rather, SD-JWT can be used as a security mechanism within W3C VCDM to provide privacy-preserving selective disclosure.
To ensure interoperability in the EUDI Wallet, it is crucial that we do not allow open-ended choices or support multiple, competing attestation models beyond a strict minimum. Currently, the EUDI Wallet already supports two attestation models:
Adding a third or more attestation models would introduce significant risks, including:
Thus, while diversity in attestation formats may seem beneficial in theory, in practice, it introduces unnecessary complexity, security risks, and operational burdens. A clear and limited selection of attestation models is essential to ensure a coherent, secure, and interoperable EUDI Wallet ecosystem.
For all the above reasons, the requirement [PID_\01] included in the the PID Rulebook of Annex 3 of the ARF still applies.
Privacy is a critical concern, especially regarding how attestation data is presented and verified. All the attestation categories mentioned above implement selective disclosure using a technique called salted and hashed data. This approach conceals specific attributes by hashing their values, allowing the user to select which attributes to disclose when presenting their attestations or attestations.
However, this technique—like user signatures on presentations—leaves cryptographic "fingerprints" that could be exploited to track users across different interactions.
While salting and hashing can obfuscate attestation data, it has inherent weaknesses, particularly in scenarios where PID Providers or Attestation Providers and Relying Parties collude or if they are subject to data breaches as described in [Topic A]:
To truly mitigate these risks, more advanced cryptographic techniques—particularly Zero-Knowledge Proofs (ZKPs)—are required.
ZKPs provide a stronger privacy-preserving alternative by allowing users to:
While hashed data with salts provides basic privacy protections and is essential when proving real identity, it does not ensure unlinkability and remains susceptible to PID Provider or Attestation Provider-Relying Party collusion or subjection to a data breach. In contrast, ZKP-enhanced attestations offer a higher level of privacy assurance, enabling secure, verifiable, and unlinkable digital interactions while minimizing data exposure.
Zero-Knowledge Proofs (ZKPs) are particularly useful in situations where you do not want—and are not required—to disclose specific personal information, such as your name or surname.
However, if full identity verification is required (e.g., for opening a bank account or signing a contract), ZKPs cannot prevent linking, as the disclosed PII will inherently allow correlation. Therefore, ZKPs are most effective when proving eligibility without the need for full identity disclosure, enabling strong privacy protection in scenarios where anonymity and unlinkability are critical.
Zero-Knowledge Proofs (ZKPs) can be integrated into any of the attestation categories mentioned above, and ongoing developments are actively working to implement ZKP support across different models. This is discussed in more depth in [Topic_G].
A particularly important effort focuses on developing ZKP mechanisms using cryptographic algorithms that are widely recognised and standardised by by NIST and SOG-IS.
Specifically, there is growing interest in leveraging ECDSA-based ZKPs, as ECDSA is already supported by secure hardware such as Hardware Security Modules (HSMs) and Secure Elements (SEs). This approach aims to ensure that ZKP can be implemented efficiently within the EUDI Wallet ecosystem while maintaining strong security guarantees and compatibility with level of assurance requested by the Regulation.
However, it is important to note that these developments are still relatively new and require further validation and broad review by experts in the cryptographic and identity communities. Ensuring that these mechanisms meet security, performance, and regulatory requirements will be essential before they can be widely adopted in real-world deployments.
For more details on these advancements, the following recent research articles explore ECDSA-based ZKPs and their potential applications:
These developments mark a significant step toward making ZKPs practical, scalable, and compatible with the security requirements of the EUDI Wallet ecosystem, but further scrutiny and testing are necessary to confirm their feasibility in large-scale implementations.
Based on the outcomes of the discussion of the focus group meeting, the requirement [PID_01] defined in Annex 3 of the ARF remains active. This requirement mandates the following:
A PID Provider SHALL issue any PID in both the format specified in ISO/IEC 18013-5 [ISO/IEC 18013-5] and the format specified in [SD-JWT VC]
The following High-Level Requirements will be added in Annex 3 of the ARF
A PID Provider issuing [SD-JWT VC]-compliant PIDs SHALL include the vct claim in their PIDs, where the vct claim will be a URN. A catalog linked in the PID Rulebook will associate this URN with SD-JWT VC type metadata which will include the same information as the PID Rulebook.
The following requirement is modified (changes in bold)
Req_06bFor [SD-JWT VC]-compliant attestations, the Schema Provider for the Attestation Rulebook SHALL ensure that each claim name is either included in the IANA registry for JWT claims, or is Public Name as defined in RFC 7519, or is a Private name specific to the attestation type, which is defined by the vct claim. Note: [SD-JWT VC] does not discuss how to avoid conflicting claim names. Since SD-JWTs are a special kind of JWTs, the methods specified in RFC 7519 are applicable.
| Reference | Description |
|---|---|
| [Fet2024] | SD-JWT VC DM Credential Format, available at https://github.com/danielfett/sd-jwt-vc-dmi |
| [Fri2024] | Matteo Frigo and abhi shelat, Anonymous credentials from ECDSA, Cryptology ePrint Archive, Paper 2024/2010, 2024, available at https://eprint.iacr.org/2024/2010 |
| [Jon2025] | Securing Verifiable Credentials using JOSE and COSE, available at https://www.w3.org/TR/vc-jose-cose/ |
| [Paq2024] | Christian Paquin, Guru-Vamsi Policharla, and Greg Zaverucha, Crescent: Stronger Privacy for Existing Credentials, Cryptology ePrint Archive, Paper 2024/2013, 2024, available at https://eprint.iacr.org/2024/2013 |
| [Spo2025] | Verifiable Credential Data Integrity 1.0, available at https://www.w3.org/TR/vc-data-integrity/ |
| [SD-JWT VC] | SD-JWT-based Verifiable Credentials (SD-JWT VC), IETF draft, available at https://www.ietf.org/archive/id/draft-ietf-oauth-sd-jwt-vc-08.html |
| [Topic_G] | Discussion Paper for the European Digital Identity Cooperation Group regarding Topic G: Zero Knowledge Proof, version 1.4 |