Yeah, I think it’s using a protocol pioneered by IBM, so it’s somewhat similar to verifiable credentials, but it has its own proof system. There was also a transcript in which I talked with IRMA researchers about the details like zero-knowledge proofs and so on. So, it’s all in the transcript.

Keyboard shortcuts

j previous speech k next speech