Decentralized Identity (DID) & Verifiable Credential (VC) Explorer
An interactive playground for exploring how digital identity can work without central authorities, using cryptography to ensure trust.
Enhanced DID Methods Explorer
Create, manage, and verify decentralized credentials with advanced features
🔑 did:key - Pure Cryptography🌐 did:web - Custom Domains📜 Credential History🔍 Import/Export
Step 1: Create Your Identity
Choose DID methods that match your use case. Individuals might prefer did:key for privacy, while institutions often use did:web for trust.
Your Personal DID
Institution DID
DID Key Benefits
- ✓No external dependencies
- ✓Works offline
- ✓Instant resolution
- ✓Maximum decentralization
DID Web Use Cases
- •Corporate identities
- •Educational institutions
- •Government services
- •Public-facing organizations
Step 2: Issue a Credential (As Institution)
Now act as an institution. Select a credential type and issue it to the recipient.
Step 3: Verify the Credential (As Employer/Verifier)
Now act as a verifier. The verification process works across all DID methods!
Real-World Scenario: How DIDs & VCs Work
Imagine Sarah is graduating from university and needs to prove her degree to employers:
🎓 The Traditional Way (Problems)
- •Sarah gets a paper diploma (can be forged)
- •Employers must call the university to verify (time-consuming)
- •University database could be hacked or go offline
- •Sarah has no control over her own credentials
🔐 The DID & VC Way (Solutions)
- •Sarah creates her DID - Her own cryptographic identity that she controls
- •University issues a VC - They digitally sign her degree with their DID
- •Instant verification - Employers verify the signature mathematically
- •Tamper-proof - Any changes invalidate the signature
- •Always available - No need to contact the university
🚀 Try This Scenario Yourself
Let's simulate Sarah getting her university degree credential:
- •Sarah (You): Generate your personal DID and copy it - you'll need to share it with the university
- •University: Generate an institution DID to represent the university
- •Issue Degree: Manually paste Sarah's DID and issue her a credential, then copy the credential
- •Employer: Paste the credential you received to verify its authenticity
The manual copy-paste simulates real-world communication where different parties don't share the same system!
Try It Yourself
The explorer above lets you play all three roles in the credential ecosystem:
- •As an Individual - Generate your personal DID (your digital identity)
- •As an Institution - Issue a credential to someone by entering their DID
- •As a Verifier - Verify the credential's authenticity through cryptography
Watch the animations to see:
- •How institutions cryptographically sign credentials
- •The step-by-step verification process
- •Why tampering is impossible without the private key
Why This Matters
- •You own your identity - No company or government controls your DID
- •Instant verification - No phone calls, no waiting
- •Cannot be forged - Cryptography makes fakes impossible
- •Privacy-preserving - Share only what's needed
- •Works offline - No central server required
Learn More
Expand the "Understanding the Cryptography" section below to dive deeper into how public key cryptography makes this system secure and trustworthy.