-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exchange of Electronic Certificate of Origin to facilitate Cross Border Trade #157
Comments
Thanks for the PR. @KDean-GS1 and I are looking at it in more detail. |
Thanks Joe and Kevin. Wondering if you guys have more comments regarding this |
Ok. This is an intriguing use case, especially the progressive redaction as the VC travels through the supply chain. However, that makes us wonder if we can, in fact, derive a secondary proof from the initial derived proof. Seems like it should be possible with BBS, but we haven't seen it done. I think Gordian envelopes may also offer that possibility. Is that something you have working in practice? In general, I'd like to see this focus on a single, concrete flow that we can describe concisely. For example, a particular product that originates somewhere, gets an eCOC, then travels through the supply chain with different reasons that various, different details are shared at different points. For example, I can imagine a flow for a bottle of champagne that starts in France, makes its way through ports and customs to be purchased by a US Consumer. At which point does which party perform some form of redaction or selective disclosure? Who is giving this evolving eCOC to whom? In particular, when considering possible flows, it seems at least one flow would not be viable. Consider selective disclosure as a product travels through the supply chain, but the final details are revealed to the final consumer. Intermediate parties often don't need to know the details, perhaps just that there is a valid eCOC for a particular class of goods from a particular country. However, end users will often want to know tons of details, such as the manufacturer or the date of manufacturing, etc. Unfortunately, that does not seem to be possible with any approach I'm familiar with. Can you describe how a specific product would use this mechanism as it travels the supply chain? |
The issue was discussed in a meeting on 2024-09-27
View the transcript5.1. Exchange of Electronic Certificate of Origin to facilitate Cross Border Trade (issue vc-use-cases#157)See github issue vc-use-cases#157. Joe Andrieu: There is another trade supply usecase that we are working to unpack. This aims to make a concrete case for selective disclosure in products going through the supplychain. Kevin Dean: This is issue 157. Joe Andrieu: I want to mine the test suite for implementers to find people using VCs in the wild. Manu Sporny: Do the tradetrust folks(issue 157) want to speak to their usecase. SinYong: If I issue an invoice to you, you may want to hide your name from me. To obfuscate from the invoices. This applies to suppliers of products.You have to pay to ship you product from point a to point b. You do no want your downstream parties to know how much you paid. Kevin Dean: That is true in many supply chain cases. I may need proof that I am a retailer, without knowing exactly who I am. Manu Sporny: This is a really important usecase, because it signals we do not have a cryptosuite that is capable of this yet. Joe Andrieu: Is this possible? There is innovative/novel cryptography that can do this. Manu Sporny: Yes, it is possible. SinYong: When we do our project, the holder ???, We do not want to issue VCs to every party along the supplychain. We use the VC to represent a tree structure. It does not issue the VC to any particular holder. Kevin Dean: interesting. In redaction you still have the same public key to identify the issuer. This can't go with the credential. It may still give the opportunity to identify who the supplier might be. cc: Our merkle proof signatures are going to bepublished and made into an extension. Denken Chen: We are starting to explore an open ecosystem of VC and DIDs. We could contribute our research back to the community. Brent Zundel: I think yes. Manu Sporny: +1 to brent. Simone is putting together a threat modelling approach for multiple groups to go through. Joe Andrieu: We do have a section about threats in the use case document. But this is not based on any of the work. What we have is closer to a risk analysis. Denken Chen: I know in W3C the threat modelling is an overview. In our work, we have a more detailed threat modelling of specific usecases. We are focused on threat modelling for issuers, holders and verifiers. We may be able to contribute this. Brent Zundel: Any additional comments? |
@jandrieu and @KDean-GS1, let's follow up with a detailed walkthrough of the use case. |
The issue was discussed in a meeting on 2024-10-09
View the transcript3. Controller Document.See github issue vc-use-cases#157. Calvin Cheng: I apologize if this is not the right time, because with my colleagues here, we are just trying to move forward on the use case, I want to highlight and mention this, but we will probably work with you all offline on a followup. Joe Andrieu: I just want to confirm cc that we want to work with you and probably should set up a call. Now that I understand you have this novel cryptography that enables this use case, happy to work with you and move this forward. Calvin Cheng: we will set up a call. Manu Sporny: this is going back to controller document, but +1 to the use case that cc mentioned. |
Background
Today, cross-border trade and transport of goods take place on the basis of many documents and processes that are paper-based (hence manual), time-consuming, and resource-intensive process for all stakeholders. Another downside of such paper-based processes is that there is no easy way to verify the accuracy and authenticity of the trade documents. This results in inefficiencies and delays as the time required to process such paper documents far exceeds the actual time taken for the physical movement of goods. According to a study by McKinsey in 2022, documentation for a single shipment can require up to 50 sheets of paper that are exchanged with up to 30 different stakeholders.
To address these inefficiencies, we have developed TradeTrust. TradeTrust, which is built upon OpenAttestation framework, comprises globally accepted standards and frameworks that allow governments and businesses to issue, verify and effect title transfer of electronic documents across different digital platforms seamlessly. TradeTrust uses cryptography and decentralised identifier (DID) technical methods to assure the authenticity and provenance of these electronic documents.
As a framework, TradeTrust is designed and developed to support the digitalization of documents used in Cross-Border Trade processes. Such documents could include those that are used to convey information such as Packing Lists and Certificates of Origin (CO) thus making them verifiable with respect to their authenticity and provenance. A CO is a document commonly used in Trade to attest that a product originates from a particular country. For more information, please see https://iccwbo.org/business-solutions/certificates-of-origin/.
Distinction
Existing trade documents are typically printed hardcopies secured with wet ink stamps. These documents are susceptible to forgery and manipulation. A digital verifiable document would allow for
Actors
Using an electronic Certificate of Origin (eCO) as an example of a digital document that is issued via the TradeTrust framework, below are the typical actors involved in its processing.
Customs Administration or duly licensed parties like Chambers of Commerce
Customs Administration and/or Chamber of Commerce are the typical authorities responsible for producing an eCO. It is typically needed by importers/buyers to claim tariff exemptions from the importing customs authority or to provide assurance that the goods are indeed from a particular country. It is provided to importers/buyers by the exporters/sellers whom they buy from and often used in financing arrangements with banks.
Banks
In cross-border trade, sometimes buyers and sellers may arrange for trade financing services to mitigate the risks of non-payment or non-delivery. Banks and other Financial Institutions are often engaged as intermediaries to mitigate these risks using financing instruments such as a Letter of Credit (L/C). A L/C is applied for by the Buyer and will specify a list of trade documents that the Banks will need to sight and verify on behalf of their clients. One of the often-required documents can be an eCO.
Importer
An Importer/Buyer is the party who purchases and receives products from the seller. If there is a Free Trade Agreement between the importing country and the goods’ origin country, the Importer can provide the eCO during importation clearance procedures to obtain tariff exemptions for the goods.
Exporter
An Exporter/Seller is the party who sells and transports products to his buyer. The Exporter is the party who applies for the eCO from the Customs Administration or duly licensed parties like Chambers of Commerce within the exporting country, upon the request of the Importer.
Issuer
A Customs Administration and/or Chamber of Commerce are the typical authorities responsible for producing an eCO.
Subject
The eCO attests that the origin of the goods is a particular country. It is used to claim tariff exemptions from the importing customs authority or to provide assurance that the goods are indeed from a particular country.
Holder
The eCO can be held by the Importer (and/or their appointed customs broker) and presented to the importing country’s customs administration for import tariff exemption if there is an in-force Free Trade Agreement between the goods’ origin country and the importing country. The eCO can also be held by the Exporter and Banks for trade financing purposes.
Verifier
The eCO is verified by the importing country’s Custom Authority during the importation of goods. It is also verified by Banks if the Exporter and/or Importer has financing arrangements that call for it. It is also verified by the importer to assure that the goods originated from the expected country.
Validation Requirements
Document verification can be initiated by invoking the open-sourced verification library, or via the trusted verification portals which run the open-sourced verification library.
There are no other relationship or dependencies on other Verifiable Credentials.
Example Artefacts
Verifiable Credential
Electronic Certificate of Origin
Based on older OpenAttestation v2. Latest OpenAttestation v4 Alpha is now W3C VC Data Model 2.0 compliant.
Trust Hierarchy
The trust can be separated into 2 parts.
Threat Model
To be added.
Risk - Put simple description here
Put detailed description here, including and especially the response(s) to the risk.
The text was updated successfully, but these errors were encountered: