Resources


White Paper


Public Repos

Upcoming…


Doc API

Upcoming…

Articles

  • What Is a KMS?

    A Key Management System (KMS) is a system designed to manage cryptographic keys – the digital credentials used to encrypt and decrypt sensitive information. Cryptographic keys are essential for secure communication, data protection, and many digital operations where confidentiality and integrity are required. A KMS provides a centralized framework for generating these keys, securely storing…

  • What is a public key?

    A public key is a piece of information you can safely share that helps other people or systems do secure things with you online. Most often, it is used for encrypting data (so only you can read it) and verifying digital signatures (so others can confirm something really came from you). Public keys are one…

  • What are Verifiable Credentials?

    Verifiable Credentials (VCs) are digitally signed credentials that let someone prove something about a set of claims in a way that’s easy to verify and tamper-proof. If you’ve ever shown a paper diploma, a professional certificate, or any supporting document, you already understand the concept. A verifiable credential is the digital equivalent, but with an…


Frequently Asked Questions

Our solution is based on Verifiable Credentials, which natively embed revocation mechanisms, and which can be permanently deleted when stored off-chain. Consequently, our processes respect the right to be forgotten, as stated in the GDPR.
RLDAC is a data processor, the legal basis for processing personal data is to be chosen by the data controller, conforming to GDPR guidelines.

In delegated mode, we store the credentials on our servers. You can access them anytime and monitor everything about them with the open source Zero-Trust Adit Kit.
In local mode, credentials are stored on your servers (on-prem).

If you need to go beyond the quota you initially decided, you can contact us to request for raising it. Extra VCs that are to be issued will be invoiced separately.

Yes, during your onboarding, at least one user admin is designated. Then, this user admin can assign admin privileges to other users.

All the operations that necessitate handling your private key are performed using a KMS (Key Management System). You need first to set up your KMS, you can then grant controlled accesses to the usage of the private key, but the private key itself remains hidden. All the subsequent interactions with the private key will generate logs that you can access on your KMS interface.

A KMS (Key Management System) is a service that securely creates, stores, manages, and controls access to encryption keys. It helps protect sensitive data by handling key generation, rotation, permissions, and auditing – without exposing the keys to applications or users.

Verifiable Credentials are digital credentials (like a diploma, license, or bill) that package one or more claims from an issuer plus a cryptographic proof, usually a private key signature. The issuer is identified by a Decentralized Identifier (DID), and verifiers can resolve that DID to be granted verification methods such as public keys. In practice, the proof binds to the credential data via hashes: the data is hashed into a fixed-length digest, and the signature or proof is computed over that digest so any change to the credential is detectable. They’re typically exchanged in a three-party flow: issuer, holder, verifier.

DIDs are a type of identifier designed for verifiable, decentralized digital identity, controlled by the DID’s owner rather than a central provider. A DID can identify many kinds of subjects and is intended to be decoupled from centralized registries/identity providers.

An asymmetric key pair (or simply “key pair”) is a public key and its corresponding private key. The two keys are mathematically related and used for complementary operations, e.g., sign with the private key and verify with the public key, or encrypt with the public key and decrypt with the private key.

A public key is the shareable half of an asymmetric key pair. Others can use it to verify your digital signatures (or encrypt data for you), while the matching private key stays secret.

A cryptographic hash function takes data of any size as an input, and outputs a fixed-length “digest” (a fingerprint) corresponding to the input and used to represent it. Good cryptographic hashes are designed to be one-way (which means that it is computationally infeasible to find any input that maps to any pre-specified digest) and collision-resistant (meaning that it is computationally infeasible to find two different inputs that have the same digest), making them useful for integrity checks and tamper evidence.