Skip to content
/ vck Public

Kotlin Multiplatform library implementing W3C VC Data Model and ISO 18013-5 mDL

License

Notifications You must be signed in to change notification settings

a-sit-plus/vck

Repository files navigation

VC-K – Verifiable Credentials Library for Kotlin Multiplatform

VC-K – Verifiable Credentials Library for Kotlin Multiplatform

A-SIT Plus Official GitHub license Kotlin Kotlin Java Maven Central

This library implements verifiable credentials to support several use cases, i.e. issuing of credentials, presentation of credentials and validation thereof. This library may be shared between backend services issuing credentials, wallet apps holding credentials, and verifier apps validating them.

Architecture

This library was built with Kotlin Multiplatform and Multiplatform Mobile in mind. Its primary targets are JVM, Android and iOS. In order to achieve smooth usage especially under iOS, there have been some notable design decisions:

  • Code interfacing with client implementations uses the return type KmmResult to transport the Success case (i.e. a custom data type) as well as potential errors from native implementations as a Failure.
  • Native implementations can be plugged in by implementing interfaces, e.g. PlatformCryptoShim and KeyMaterial, as opposed to callback functions.
  • Use of primitive data types for constructor properties instead of e.g. kotlinx datetime types.
  • As much code as possible is implemented in the commonMain module

Notable features for multiplatform are:

  • Use of Napier as the logging framework
  • Use of Kotest for unit tests
  • Use of kotlinx-datetime for date and time classes
  • Use of kotlinx-serialization for serialization from/to JSON and CBOR
  • Implementation of a ZLIB service in Kotlin with native parts, see ZlibService
  • Implementation of JWS and JWE operations in pure Kotlin (delegating to native crypto), see JwsService
  • Implementation of COSE operations in pure Kotlin (delegating to native crypto), see CoseService

Some parts for increased multiplatform support have been extracted into separate repositories:

  • Reimplementation of Kotlin's Result called KmmResult for easy use from Swift code (since inline classes are not supported).
  • Several crypto datatypes (including an ASN.1 parser and encoder), as well as a mulitplatform crypto library, called Signum.

The main entry point for applications is an instance of HolderAgent, VerifierAgent or IssuerAgent, according to the nomenclature from the W3C VC Data Model.

Many classes define several constructor parameters, some of them with default values, to enable a simple form of dependency injection. Implementers are advised to specify the parameter names of arguments passed to increase readability and prepare for future extensions.

Features

Credentials may be represented as plain JWTs in the W3C VC Data Model, as ISO mDoc credentials according to ISO/IEC 18013-5:2021, or simply as a list of claims and values for SD-JWT.

When using the plain JWT representation, the single credential itself is an instance of CredentialSubject. For ISO mDoc claims see IssuerSignedItems and related classes like Document and MobileSecurityObject. For SD-JWT claims see SelectiveDisclosureItem and SdJwtSigned.

Other libraries implementing credential schemes may call LibraryInitializer.registerExtensionLibrary() to register with this library. See our implementation of the EU PID credential or our implementation of the Mobile Driving Licence for examples. We also maintain a comprehensive list of all credentials powered by this library.

For the OpenID protocol family, issuing is implemented using OpenID for Verifiable Credential Issuance, see WalletService and CredentialIssuer. Presentation of credentials is implemented using Self-Issued OpenID Provider v2, supporting OpenID for Verifiable Presentations, see OidcSiopVerifier and OidcSiopWallet.

Limitations

  • Several parts of the W3C VC Data Model have not been fully implemented, i.e. everything around resolving cryptographic key material.
  • Anything related to ledgers (e.g. resolving DID documents) is out of scope.
  • Trust relationships are mostly up to clients using this library.
  • The PlatformCryptoShim for iOS should not be used in production as it does not implement encryption, decryption, key agreement and message digests correctly. See the Swift Package for details on a more correct iOS implementation, or track the progress for Signum milestone 1.

Dataflow for OID4VCI

We'll present an issuing process according to OID4VCI, along with OID4VP, with all terms taken from there.

The credential issuer serves the following metadata:
{
  "issuer": "https://wallet.a-sit.at/credential-issuer",
  "credential_issuer": "https://wallet.a-sit.at/credential-issuer",
  "authorization_servers": [
    "https://wallet.a-sit.at/authorization-server"
  ],
  "credential_endpoint": "https://wallet.a-sit.at/credential-issuer/credential",
  "token_endpoint": "https://wallet.a-sit.at/authorization-server/token",
  "authorization_endpoint": "https://wallet.a-sit.at/authorization-server/authorize",
  "credential_identifiers_supported": true,
  "credential_configurations_supported": {
    "at.a-sit.wallet.atomic-attribute-2023": {
      "format": "mso_mdoc",
      "scope": "at.a-sit.wallet.atomic-attribute-2023",
      "cryptographic_binding_methods_supported": [
        "cose_key"
      ],
      "credential_signing_alg_values_supported": [
        "ES256"
      ],
      "doctype": "at.a-sit.wallet.atomic-attribute-2023.iso",
      "claims": {
        "at.a-sit.wallet.atomic-attribute-2023": {
          "given_name": {},
          "family_name": {},
          "date_of_birth": {}
        }
      }
    },
    "AtomicAttribute2023#jwt_vc_json": {
      "format": "jwt_vc_json",
      "scope": "AtomicAttribute2023",
      "cryptographic_binding_methods_supported": [
        "did:key",
        "urn:ietf:params:oauth:jwk-thumbprint"
      ],
      "credential_signing_alg_values_supported": [
        "ES256"
      ],
      "credential_definition": {
        "type": [
          "VerifiableCredential",
          "AtomicAttribute2023"
        ],
        "credentialSubject": {
          "given_name": {},
          "family_name": {},
          "date_of_birth": {}
        }
      }
    },
    "AtomicAttribute2023#vc+sd-jwt": {
      "format": "vc+sd-jwt",
      "scope": "AtomicAttribute2023",
      "cryptographic_binding_methods_supported": [
        "did:key",
        "urn:ietf:params:oauth:jwk-thumbprint"
      ],
      "credential_signing_alg_values_supported": [
        "ES256"
      ],
      "vct": "AtomicAttribute2023",
      "claims": {
        "given_name": {},
        "family_name": {},
        "date_of_birth": {}
      }
    }
  }
}
The credential issuer starts with a credential offer:
{
  "credential_issuer": "https://wallet.a-sit.at/credential-issuer",
  "credential_configuration_ids": [
    "at.a-sit.wallet.atomic-attribute-2023",
    "AtomicAttribute2023#jwt_vc_json",
    "AtomicAttribute2023#vc+sd-jwt"
  ],
  "grants": {
    "authorization_code": {
      "issuer_state": "18136181-97fd-4af9-9e66-85a51cdea269",
      "authorization_server": "https://wallet.a-sit.at/authorization-server"
    },
    "urn:ietf:params:oauth:grant-type:pre-authorized_code": {
      "pre-authorized_code": "2c74a00b-70b8-4062-9757-75652174bc5d",
      "authorization_server": "https://wallet.a-sit.at/authorization-server"
    }
  }
}
Since the issuer provides a pre-authorized code, the wallet uses this for the token request:
{
  "grant_type": "urn:ietf:params:oauth:grant-type:pre-authorized_code",
  "redirect_uri": "https://wallet.a-sit.at/app/callback",
  "client_id": "https://wallet.a-sit.at/app",
  "authorization_details": [
    {
      "type": "openid_credential",
      "format": "vc+sd-jwt",
      "vct": "AtomicAttribute2023"
    }
  ],
  "pre-authorized_code": "2c74a00b-70b8-4062-9757-75652174bc5d"
}
The credential issuer answers with an access token:
{
  "access_token": "413ed326-107b-4429-8efa-872cb89949d8",
  "token_type": "bearer",
  "expires_in": 3600,
  "c_nonce": "4fc81553-970e-4765-899f-611d7c4173ae",
  "authorization_details": []
}
The wallet creates a credential request, including a proof-of-possession of its private key:
{
  "format": "vc+sd-jwt",
  "vct": "AtomicAttribute2023",
  "proof": {
    "proof_type": "jwt",
    "jwt": "eyJ0eXAiOiJvcGVuaWQ0dmNpLXByb29mK2p3dCIsImFsZyI6IkVTMjU2IiwiandrIjp7ImNydiI6IlAtMjU2Iiwia3R5IjoiRUMiLCJ4IjoiS1R2WlRpX28xeTc5REQwSk1IanZyYUpkaXFEWGpNZlZIZVNYemVEVVV4ZyIsInkiOiJiUkZReC1meG9GOURJOTdUWmRQZmNYUXlEY0V0eEQydlNTNWNZMERHYXJZIn19.eyJpc3MiOiJodHRwczovL3dhbGxldC5hLXNpdC5hdC9hcHAiLCJhdWQiOiJodHRwczovL3dhbGxldC5hLXNpdC5hdC9jcmVkZW50aWFsLWlzc3VlciIsIm5vbmNlIjoiNGZjODE1NTMtOTcwZS00NzY1LTg5OWYtNjExZDdjNDE3M2FlIiwiaWF0IjoxNzIwNDIyNTM3fQ.FNM1BCli6pHEXedxRGOmNzxfpsEwQz67onbeQZfRU4tNxEqYauW45MrFkrYsi0Ly7wvfdoPkONZG7s7EmD-vkA"
  }
}
The JWT included decodes to the following:
{
  "typ": "openid4vci-proof+jwt",
  "alg": "ES256",
  "jwk": {
    "crv": "P-256",
    "kty": "EC",
    "x": "KTvZTi_o1y79DD0JMHjvraJdiqDXjMfVHeSXzeDUUxg",
    "y": "bRFQx-fxoF9DI97TZdPfcXQyDcEtxD2vSS5cY0DGarY"
  }
}

and

{
  "iss": "https://wallet.a-sit.at/app",
  "aud": "https://wallet.a-sit.at/credential-issuer",
  "nonce": "4fc81553-970e-4765-899f-611d7c4173ae",
  "iat": 1720422537
}
The credential issuer issues the following credential:
{
  "format": "vc+sd-jwt",
  "credential": "eyJraWQiOiJkaWQ6a2V5OnpEbmFleVlrcDlqZ0hjN3lheEcybkZTMXc4MXJISkVyS3hZSkVtTExVRTJVU05wWmUiLCJ0eXAiOiJ2YytzZC1qd3QiLCJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJkaWQ6a2V5OnpEbmFlVEN2aDdZS1N5b21hUnFONFZ3TnZSZFRLdzJBakVkR0VkcndtNHZEUXU5RXciLCJuYmYiOjE3MjA0MjI1MzcsImlzcyI6ImRpZDprZXk6ekRuYWV5WWtwOWpnSGM3eWF4RzJuRlMxdzgxckhKRXJLeFlKRW1MTFVFMlVTTnBaZSIsImV4cCI6MTcyMDQyMjU5NywiaWF0IjoxNzIwNDIyNTM3LCJqdGkiOiJ1cm46dXVpZDpkODE1ZTEwZC1hNDRkLTQxNDQtYmZhNS05Zjk5MTNjZjE5ZmUiLCJfc2QiOlsiaHBNUTFpeWV0cTkzeWVCNG5FZXVmeDYweHY0WTVqbHFWcThIc2tJc1pZMCIsIkFHR1hZRTlIeXF1bGxTSF9iTC02dkRTSEhyZU9HckRWUVVOdEVQM3p1QlEiLCJva2VaSElRQkNQVlVxdUo4VmI3bHd2bWtLWnNmUktKVUE3X0VOMlZjX2M0Il0sInZjdCI6IkF0b21pY0F0dHJpYnV0ZTIwMjMiLCJzdGF0dXMiOnsiaWQiOiJodHRwczovL3dhbGxldC5hLXNpdC5hdC9iYWNrZW5kL2NyZWRlbnRpYWxzL3N0YXR1cy8xIzMiLCJ0eXBlIjoiUmV2b2NhdGlvbkxpc3QyMDIwU3RhdHVzIiwicmV2b2NhdGlvbkxpc3RJbmRleCI6MywicmV2b2NhdGlvbkxpc3RDcmVkZW50aWFsIjoiaHR0cHM6Ly93YWxsZXQuYS1zaXQuYXQvYmFja2VuZC9jcmVkZW50aWFscy9zdGF0dXMvMSJ9LCJfc2RfYWxnIjoic2hhLTI1NiIsImNuZiI6eyJjcnYiOiJQLTI1NiIsImt0eSI6IkVDIiwia2lkIjoidXJuOmlldGY6cGFyYW1zOm9hdXRoOmp3ay10aHVtYnByaW50OnNoYTI1NjpaaC1yNlZsWE5UQUZheTVYVjFzWFpJUG5mZjdHcGVZMFAzTHNPVDJmSFlRPSIsIngiOiJLVHZaVGlfbzF5NzlERDBKTUhqdnJhSmRpcURYak1mVkhlU1h6ZURVVXhnIiwieSI6ImJSRlF4LWZ4b0Y5REk5N1RaZFBmY1hReURjRXR4RDJ2U1M1Y1kwREdhclkifX0.oDdilbVBmoRpy162gcDR8a0vvYHlP7LXvJ3gxmjz4dYKRLhoMwM_tIcu0Dy5_ftXPq5IO1p9GYMkfUhHk881kw~WyI4cWRNYkN6SWZGajQxT1ZVUE13OEI5R2xaN2tiemxxaXg5T1RSU2huWGgwIiwiZ2l2ZW5fbmFtZSIsIkVyaWthIl0~WyIxUDdYQjB5eFFjaVBlZkVrV2o5R2N0MzNUYVZXeGNnVER1N19aTGptWG13IiwiZmFtaWx5X25hbWUiLCJNdXN0ZXJmcmF1Il0~WyJ3a2VlWG4wejAwa2tiaHVaeVBXM2dwZVBpOXhSVWU1cmVrQ3Npc2d6ZXg4Iiwic3ViamVjdCIsInN1YmplY3QiXQ"
}
The SD-JWT included decodes to the following:
{
  "sub": "did:key:zDnaeTCvh7YKSyomaRqN4VwNvRdTKw2AjEdGEdrwm4vDQu9Ew",
  "nbf": 1720422537,
  "iss": "did:key:zDnaeyYkp9jgHc7yaxG2nFS1w81rHJErKxYJEmLLUE2USNpZe",
  "exp": 1720422597,
  "iat": 1720422537,
  "jti": "urn:uuid:d815e10d-a44d-4144-bfa5-9f9913cf19fe",
  "_sd": [
    "hpMQ1iyetq93yeB4nEeufx60xv4Y5jlqVq8HskIsZY0",
    "AGGXYE9HyqullSH_bL-6vDSHHreOGrDVQUNtEP3zuBQ",
    "okeZHIQBCPVUquJ8Vb7lwvmkKZsfRKJUA7_EN2Vc_c4"
  ],
  "vct": "AtomicAttribute2023",
  "status": {
    "id": "https://wallet.a-sit.at/backend/credentials/status/1#3",
    "type": "RevocationList2020Status",
    "revocationListIndex": 3,
    "revocationListCredential": "https://wallet.a-sit.at/backend/credentials/status/1"
  },
  "_sd_alg": "sha-256",
  "cnf": {
    "crv": "P-256",
    "kty": "EC",
    "kid": "urn:ietf:params:oauth:jwk-thumbprint:sha256:Zh-r6VlXNTAFay5XV1sXZIPnff7GpeY0P3LsOT2fHYQ=",
    "x": "KTvZTi_o1y79DD0JMHjvraJdiqDXjMfVHeSXzeDUUxg",
    "y": "bRFQx-fxoF9DI97TZdPfcXQyDcEtxD2vSS5cY0DGarY"
  }
}
with the following claims appended:
["8qdMbCzIfFj41OVUPMw8B9GlZ7kbzlqix9OTRShnXh0","given_name","Erika"]
["1P7XB0yxQciPefEkWj9Gct33TaVWxcgTDu7_ZLjmXmw","family_name","Musterfrau"]
["wkeeXn0z00kkbhuZyPW3gpePi9xRUe5rekCsisgzex8","date_of_birth","1980-01-13"]

Dataflow for SIOPv2

We'll present a presentation process according to SIOPv2, along with OID4VP, with all terms taken from there.

The verifier creates a URL to be displayed to the wallet, containing a reference to the authentication request itself:
https://wallet.a-sit.at/mobile
    ?client_id=https://example.com/rp
    &request_uri=https://example.com/request/15a4e87c-8e3e-4368-87a3-48083bac7232
The authentication request is signed as a JWS and contains the following header and payload:
{
  "alg": "ES256",
  "x5c": [
    "MIIBNDCB2qADAgECAgjm7Gfdm0IFUDAKBggqhkjOPQQDAjASMRAwDgYDVQQDDAdEZWZhdWx0MB4XDTI0MDcxNzEzNTUzMVoXDTI0MDcxNzEzNTYwMVowEjEQMA4GA1UEAwwHRGVmYXVsdDBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCaD9zTN05m6zZSX+QrQzdF4l1Bt3pVSo6VV9VFUSFCkImDkSsyCbgkJoZFkUNObbMiZbccQk6H33HAfxGWpLTyjGjAYMBYGA1UdEQQPMA2CC2V4YW1wbGUuY29tMAoGCCqGSM49BAMCA0kAMEYCIQDSotU4YnsO0Ar5+barXkCn3PQlCaPJEnBwRL60SnHW9wIhAK5mLYgfslZvT5jFmMrS3Ivzm2EpNyjdCPGVT3wpt6/t"
  ]
}
{
  "response_type": "id_token vp_token",
  "client_id": "example.com",
  "scope": "openid profile AtomicAttribute2023 AtomicAttribute2023 at.a-sit.wallet.atomic-attribute-2023",
  "state": "36efe035-ecf6-4c56-94c8-3dfe167ddaad",
  "nonce": "148279b8-5222-4db9-bb9b-0614bbe0ef7d",
  "client_metadata": {
    "redirect_uris": [
      "https://example.com/rp"
    ],
    "jwks": {
      "keys": [
        {
          "crv": "P-256",
          "kty": "EC",
          "x": "JoP3NM3TmbrNlJf5CtDN0XiXUG3elVKjpVX1UVRIUKQ",
          "y": "ImDkSsyCbgkJoZFkUNObbMiZbccQk6H33HAfxGWpLTw"
        }
      ]
    },
    "subject_syntax_types_supported": [
      "urn:ietf:params:oauth:jwk-thumbprint",
      "did:key"
    ],
    "vp_formats": {
      "jwt_vp": {
        "alg": [ "ES256", "ES384", "ES512" ]
      },
      "vc+sd-jwt": {
        "alg": [ "ES256", "ES384", "ES512" ]
      },
      "mso_mdoc": {
        "alg": [ "ES256", "ES384", "ES512" ]
      }
    }
  },
  "id_token_type": "subject_signed_id_token",
  "presentation_definition": {
    "id": "b0611eea-89e4-4b78-8f44-40a2cb608d4a",
    "input_descriptors": [
      {
        "id": "9a5511bf-efe4-4ec2-84e5-4cabf1d13000",
        "schema": [
          {
            "uri": "https://wallet.a-sit.at/schemas/1.0.0/AtomicAttribute2023.json"
          }
        ],
        "constraints": {
          "fields": [
            {
              "path": [ "$[\"family_name\"]" ]
            },
            {
              "path": [ "$[\"given_name\"]" ]
            },
            {
              "path": [ "$.vct" ],
              "filter": {
                "type": "string",
                "pattern": "AtomicAttribute2023"
              }
            }
          ]
        }
      }
    ],
    "format": {
      "vc+sd-jwt": {
        "alg": [ "ES256", "ES384", "ES512" ]
      }
    }
  },
  "client_id_scheme": "x509_san_dns",
  "response_mode": "direct_post",
  "response_uri": "https://example.com/response",
  "aud": "https://example.com/rp",
  "iss": "https://example.com/rp"
}

The certificate includes the X.509 SAN extension with the value example.com.

The wallet posts back the response to https://example.com/response with the parameters presentation_submission, vp_token and state.

The value for `presentation_submission` is:
{
  "id": "be3972bc-18cf-4e24-abf4-fe49eb870bab",
  "definition_id": "b0611eea-89e4-4b78-8f44-40a2cb608d4a",
  "descriptor_map": [
    {
      "id": "9a5511bf-efe4-4ec2-84e5-4cabf1d13000",
      "format": "vc+sd-jwt",
      "path": "$"
    }
  ]
}
The value for `vp_token` is an SD-JWT, with header and payload:
{
  "kid": "did:key:zDnaezoC5xdfzSdKoCZCZiw52eqnTks3xMKMDRTFKfSiq9obD",
  "typ": "vc+sd-jwt",
  "alg": "ES256"
}
{
  "sub": "did:key:zDnaexYu9PCJsDmg7YwyBCJR2qQT8DxqwXhm4BLAJVWUgW1Ms",
  "nbf": 1721224531,
  "iss": "did:key:zDnaezoC5xdfzSdKoCZCZiw52eqnTks3xMKMDRTFKfSiq9obD",
  "exp": 1721224591,
  "iat": 1721224531,
  "jti": "urn:uuid:6ed95e4f-83ca-457c-8d8b-bf8bf93ad09e",
  "_sd": [
    "0nIEwdknjG7aMeKKiVnJNd7lK-dleq0_RPYc84gDg98",
    "DZo-dZ4EQTxcekJqJKvhYZySgxodgH1vvT5su__pJlk"
  ],
  "vct": "AtomicAttribute2023",
  "status": {
    "id": "https://wallet.a-sit.at/backend/credentials/status/1#2",
    "type": "RevocationList2020Status",
    "revocationListIndex": 2,
    "revocationListCredential": "https://wallet.a-sit.at/backend/credentials/status/1"
  },
  "_sd_alg": "sha-256",
  "cnf": {
    "crv": "P-256",
    "kty": "EC",
    "x": "3Tyi-VLN7pmm6kcbRuyD0bYrYllX_cH1fYbf72pNwtI",
    "y": "6K5c5nYUfRBY3vRo-Q043hr8cFCqYj3iwnxwGFF2Ca8"
  }
}
With the following claims appended:
["_bBdCtzFzC1DYL1r6gNq2fZPMvMdR31mo2zp6gq1sZ4","given_name","Susanne"]
["SNDcrxkCBGQrLj0kHiX72Gn4l5dz-sfKo12tbqAoNf8","family_name","Meier"]
["wkeeXn0z00kkbhuZyPW3gpePi9xRUe5rekCsisgzex8","date_of_birth","1990-02-14"]
As well as a key binding (the JWT is decoded):
{
  "typ": "kb+jwt",
  "alg": "ES256",
  "jwk": {
    "crv": "P-256",
    "kty": "EC",
    "x": "3Tyi-VLN7pmm6kcbRuyD0bYrYllX_cH1fYbf72pNwtI",
    "y": "6K5c5nYUfRBY3vRo-Q043hr8cFCqYj3iwnxwGFF2Ca8"
  }
}
{
  "iat": 1721224531,
  "aud": "did:key:zDnaeT2KFSXyCSo3WLjrZeQsNwaCQv2r6bV4bLZNbdhZKhBbh",
  "nonce": "148279b8-5222-4db9-bb9b-0614bbe0ef7d",
  "sd_hash": "UkLqyUz3zKR1iMTam7AsP89aEzYvbQqiJ4jfV82A96c"
}

Contributing

External contributions are greatly appreciated! Be sure to observe the contribution guidelines (see CONTRIBUTING.md). In particular, external contributions to this project are subject to the A-SIT Plus Contributor License Agreement (see also CONTRIBUTING.md).

Contributing

External contributions are greatly appreciated! Be sure to observe the contribution guidelines (see CONTRIBUTING.md). In particular, external contributions to this project are subject to the A-SIT Plus Contributor License Agreement (see also CONTRIBUTING.md).



This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 959072.

EU flag

The Apache License does not apply to the logos, (including the A-SIT logo) and the project/module name(s), as these are the sole property of A-SIT/A-SIT Plus GmbH and may not be used in derivative works without explicit permission!