#verifiable-credentials #identity #verify #sign

fi-verifiable-data

VC and VP wrapper for rust and WASM. fi-digital-signatures crate is used to sign and verify the data objects.

6 releases

0.0.6 Aug 28, 2024
0.0.5 Aug 27, 2024

#206 in Authentication

Download history 481/week @ 2024-08-24 36/week @ 2024-08-31 9/week @ 2024-09-14 3/week @ 2024-09-21 3/week @ 2024-09-28

203 downloads per month

MIT/Apache

45KB
1K SLoC

fi-verifiable-data

crates.io Test Package publish Doc

fi-verifiable-data library is focused on the representation and validation for Verifiable Credential and Verifiable Presentation. fi-digital-signatures crate is used to sign and verify VP and VC proofs. API documentation on docs.rs

Verifiable Credential

Rust

Sign

let mut vc = VC::new(
    id,
    Value::from(issuer),
    Some(Value::from(name)),
    Some(Value::from(description)),
    Some(Value::from(valid_until))
);

let private_key_bytes = hex::decode(PRIVATE_KEY_HEX).expect("Private key hex decode failed"); 

let mut eddsa_doc = VerificationDocument::new(
    String::from("doc_id"),
    Some(private_key_bytes),
    None,
);

let proof = FiProof::new(
    fi_digital_signatures::algorithms::Algorithm::EdDSA,
    String::from("ESig"),
);

match vc.sign(&mut eddsa_doc, proof) {
    Err(error) => {
        eprintln!("{}", error);
        assert!(false);
    }
    Ok(_) => {}
};

Verify

let public_key_bytes = hex::decode(PUBLIC_KEY_HEX).expect("Public key hex decode failed");

let mut eddsa_doc = VerificationDocument::new(
    String::from("doc_id"),
    None,
    Some(public_key_bytes),
);

let result = match vc.verify(&mut eddsa_doc) {
        Ok(val) => val,
        Err(error) => {
            eprintln!("{}", error);
            assert!(false);
            return;
        }
    };

WASM

Sign

const fiVerifiableData = await import("fi-verifiable-data");

let vc = new fiVerifiableData.VC("id:1", "issuer", "name", "description", new Date().toString(), [
  "https://www.w3.org/2018/credentials/v1", 
]);
 
const privateKeyBytes = Uint8Array.from(
  Buffer.from(
    "7b6df71975950d5ea15ac090c57d462f73d3a48644fbcf2c6d5db838adf136b5",
    "hex"
  )
);
let verificationDocument = new fiVerifiableData.VerificationDocument(
  "",
  privateKeyBytes,
  null
);

vc.sign(
  fiVerifiableData.Algorithm.EdDSA,
  "purpose",
  verificationDocument,
  fiVerifiableData.ProofType.FiProof
);
console.log(vc.toObject());

Verify

const fiVerifiableData = await import("fi-verifiable-data");
 
const publicKeyBytes = Uint8Array.from(
  Buffer.from(
    "aa7f263d0a1a671a4c06ea22800c1391dd8974174f01d0e5a848fe51bdd1bcf8",
    "hex"
  )
); 
let verificationDocument = new fiVerifiableData.VerificationDocument(
  "",
  null,
  publicKeyBytes
);

let result = vc.verify( 
  verificationDocument
); 

Verifiable Presentation

Rust

Sign

let private_key_bytes = hex::decode(PRIVATE_KEY_HEX).expect("rivate key hex decode failed"); 

let mut eddsa_doc = VerificationDocument::new(
    String::from("doc_id"),
    Some(private_key_bytes),
    None,
);

let mut vp = VP::new(vp_id, Some(String::from(vp_issuer)));
vp.add_verifiable_credentials(vc1);
vp.add_verifiable_credentials(vc2);

let proof = FiProof::new(
    fi_digital_signatures::algorithms::Algorithm::EdDSA,
    String::from("ESig"),
);

match vp.sign(&mut eddsa_doc, proof) {
    Err(error) => {
        eprintln!("{}", error);
        assert!(false);
    }
    Ok(_) => {}
};

Verify

let public_key_bytes = hex::decode(PUBLIC_KEY_HEX).expect("Public key hex decode failed");

let mut eddsa_doc = VerificationDocument::new(
    String::from("doc_id"),
    None,
    Some(public_key_bytes),
);

let result = match vp.verify(&mut eddsa_doc) {
        Ok(val) => val,
        Err(error) => {
            eprintln!("{}", error);
            assert!(false);
            return;
        }
    };

WASM

Sign

const fiVerifiableData = await import("fi-verifiable-data");

let vp = new fiVerifiableData.VP("id:1", "holder");
vp.addVerifiableCredential(vc1);
vp.addVerifiableCredential(vc2);
 
const privateKeyBytes = Uint8Array.from(
  Buffer.from(
    "7b6df71975950d5ea15ac090c57d462f73d3a48644fbcf2c6d5db838adf136b5",
    "hex"
  )
);
let verificationDocument = new fiVerifiableData.VerificationDocument(
  "",
  privateKeyBytes,
  null
);

vp.sign(
  fiVerifiableData.Algorithm.EdDSA,
  "purpose",
  verificationDocument,
  fiVerifiableData.ProofType.FiProof
);
console.log(vp.toObject());

Verify

const fiVerifiableData = await import("fi-verifiable-data");
 
const publicKeyBytes = Uint8Array.from(
  Buffer.from(
    "aa7f263d0a1a671a4c06ea22800c1391dd8974174f01d0e5a848fe51bdd1bcf8",
    "hex"
  )
); 
let verificationDocument = new fiVerifiableData.VerificationDocument(
  "",
  null,
  publicKeyBytes
);

let result = vp.verify( 
  verificationDocument
); 

Dependencies

~11–15MB
~283K SLoC