By clicking "Accept", you agree to the storing of cookies on your device to enhance site navigation, analyze site usage and assist in our marketing efforts. More info

End-to-end secure infrastructure to create Verifiable Credentials

Dock has built a secure, future-proof technology stack to create tamper-proof Verifiable Credentials, Decentralized Identifiers, and DApps for Decentralized Identity solutions.

Verifiable Credentials - leveraging the power of the Dock blockchain

Dock’s highly scalable Substrate-based blockchain specializes in issuing decentralized identifiers and cryptographically-signed Verifiable Credentials at a very low cost.

Verifiable Credentials and blockchain, how do they work?

Dock’s groundbreaking blockchain technology is redefining how you trust data. It is an ideal infrastructure for a completely permissionless digital credential ecosystem enabling anyone to issue, store, and verify Verifiable Credentials and create Decentralized Identifiers (DIDs), 

The Dock blockchain forms the basis of trust by maintaining a verifiable registry of all DIDs, proof of credentials issued (if the credential is anchored), public cryptographic keys, and revocation registries. Its advanced architecture prevents unauthorized users from accessing or modifying any data in the credentials.

Credentials issued on the Dock blockchain are stored off-chain, typically in a holder's digital wallet app, along with the cryptographic key pairs. To ensure data privacy, the only data registered on the Dock chain are the issuer and holder's DIDs, the Credential Schema (its "template"), and the Revocation Registries. The issuer may also record the hash of a credential on the Dock blockchain; this is called Anchoring.

Dock Technology diagram

Docking the Verifiable Credentials

Identity Owners

Everyone who owns a Decentralized Identifier (DID) on the Dock blockchain.


Entities who cryptographically sign and issue Verifiable Credentials. The issuers put a cryptographic signature into the credential using their private key.


Entities who verify the received presentations from the holder. They require verification of certain conditions to engage, transact, or provide services to holders. 


The sole owner and the receiver of Verifiable Credentials from the issuers. Holders can verify the authenticity of their received credentials and their revocation status anytime.


Defines what fields are required for the Verifiable Credential. They are a useful way of enforcing a specific structure on a verifiable credential.

PoE Anchors

Constitutes the credentials’ proof of existence that demonstrates that the credentials existed when the block containing the anchor was created in their original form (as reflected in the hash).

Revocation Registries

A registry of IDs that contains no personal information, but that is checked whenever a Verifier wants to verify if a credential has been revoked.

Decentralized Identifiers on the Dock blockchain:
Web3 begins here!

Dock’s Substrate-based, interoperable and versatile blockchain is designed to provide a secure and scalable protocol for businesses and developers to build Decentralized Identity solutions and DApps. Everyone using Web3 will need their own Decentralized Identifiers (DIDs). The Dock blockchain serves as the entry point with a protocol layer for all things Web3.

Proof of Stake - Low Cost, Highly Scalable, and Eco-friendly

Dock’s use of Nominated Proof of Stake makes its blockchain infrastructure scalable, resilient, and environment friendly. 


The Dock Blockchain uses Web3 Foundation’s GRANDPA (GHOST-based Recursive Ancestor Deriving Prefix Agreement)


Entities who run a full node on the Dock network and are in charge of producing and finalizing blocks


Earn lucrative APYs by staking $DOCK and selecting validators to process transactions and produce blocks. 


Token Holders

Invited to vote on changes to the network including network functionality, actors in the network, reward and slashing rules, and Treasury spending.

Council Members

A group of individuals who are elected using Dock's open governance to make and implement proposals by controlling which (source code) upgrades are allowed on the network.

Technical Committee

TC can fast track on-chain governance proposals made by the Council.

Create your first Reusable Digital ID today

Turn verified ID data into Reusable Digital ID Credentials, instantly verify their authenticity and get paid when they are verified by third parties.