Home Job Listings Categories Locations

Master Thesis Project | ECDSA Zero-Knowledge Credentials in Yivi’s EUDI Wallet

📍 Utrecht, Netherlands

Kunst en Entertainment Yivi App

Functiebeschrijving

Master Thesis Project | ECDSA Zero‑Knowledge Credentials in Yivi’s EUDI Wallet Join to apply for the

Master Thesis Project | ECDSA Zero‑Knowledge Credentials in Yivi’s EUDI Wallet

role at

Yivi App .

Project Overview Designing and implementing an ECDSA‑based Zero‑Knowledge Credential Architecture for Yivi as an EUDI Wallet.

Context and Motivation Yivi is a privacy‑preserving digital identity platform that has successfully launched production deployments using IRMA/Idemix protocols based on zero‑knowledge proof (ZKP) schemes. With the introduction of the EU Digital Identity (EUDI) Wallet regulation (eIDAS 2.0), Yivi aims to evolve into a compliant EUDI wallet while maintaining its strong privacy guarantees and crypto‑agile architecture.

The EUDI ecosystem increasingly standardises on:

Verifiable Credentials (e.g. W3C VC, SD‑JWT‑VC, ISO 18013‑5 mDL/MDOC)

Presentation and issuance protocols such as OpenID4VCI and OpenID4VP

Selectively disclosure and zero‑knowledge techniques analysed in detail in ETSI TR 119 476, including BBS+, CL signatures and other privacy‑enhancing cryptographic mechanisms.

Yivi wants to leverage these developments while preserving its core privacy values: minimum disclosure, unlinkability, and user‑controlled identity.

Strategic Challenge Today, many credentials in practice are signed using ECDSA keys (for example JWT‑based credentials, SD‑JWT‑VC, mDL/MDOC). At the same time, privacy‑preserving credential systems often rely on different cryptographic primitives (e.g. CL, BBS+ on BLS12‑381).

Yivi faces a strategic challenge:

How to evolve towards an EUDI‑compliant wallet that reuses existing and widely deployed ECDSA key material

Supports zero‑knowledge proofs and selective disclosure

Remains interoperable with OpenID4VCI / OpenID4VP and standard verifiers

And preserves Yivi’s strong privacy guarantees and crypto‑agility.

The ECDSA‑based ZKP Opportunity Recent work such as Google’s Longfellow project (“Anonymous credentials from ECDSA”) and new proposals around BBS# indicate that it is possible to:

Build anonymous credential schemes on top of existing ECDSA‑signed credentials

Provide selective disclosure and unlinkable presentations

Minimise changes to issuer infrastructure

Potentially integrate with standard protocols such as OpenID4VCI and OpenID4VP.

This opens the possibility for Yivi to design a next‑generation ZKP layer that:

Uses ECDSA keys as the fundamental trust anchor

Compares and possibly combines Longfellow‑style constructions with BBS+/BBS#‑based approaches

Is grounded in the requirements and recommendations of ETSI TR 119 476.

Research Objectives Primary Objective Design and prototype an ECDSA‑based zero‑knowledge credential architecture for Yivi that:

Provides selective disclosure and unlinkable presentations based on ECDSA keys

Is aligned with the cryptographic and privacy requirements from ETSI TR 119 476

Supports interoperability with OpenID4VCI and OpenID4VP

Can be integrated into Yivi’s roadmap towards an EUDI‑compliant wallet.

Specific Research Questions

RQ1:

Requirements analysis based on ETSI TR 119 476 – How can the privacy, security and interoperability requirements from ETSI TR 119 476 for selective disclosure and ZKP‑based credentials be translated into concrete requirements for a Yivi ECDSA‑ZKP architecture, in particular regarding:

Unlinkability across presentations

Minimal disclosure and predicate proofs

Revocation and status verification

Crypto‑agility and (future) post‑quantum considerations

RQ2:

ECDSA‑based ZKP design options (Longfellow vs BBS#/BBS+) – What are the design trade‑offs between:

Longfellow / “Anonymous credentials from ECDSA” using existing ECDSA‑signed credentials (JWT / SD‑JWT‑VC / MDOC) as the base

Generating zero‑knowledge proofs over attributes derived from these credentials

BBS+/BBS#‑based credentials anchored in ECDSA trust mapping Yivi (and EUDI) credential structures to BBS+/BBS# signatures

Exploring how ECDSA‑based PKI and BBS#/BBS+-based ZKP can be combined or bridged

RQ3:

Yivi architecture integration – How can an ECDSA‑based ZKP scheme (Longfellow, BBS#, or a hybrid) be integrated into Yivi’s architecture while:

Maintaining backward compatibility with existing IRMA/Idemix credentials where needed

Supporting multiple credential formats (e.g. SD‑JWT‑VC, MDOC, IRMA) within Yivi

Preserving Yivi’s privacy‑first design, including unlinkability and minimal disclosure

Allowing for crypto‑agile evolution as standards mature

RQ4:

Interoperability with OpenID4VCI and OpenID4VP – How can the proposed ECDSA‑ZKP architecture:

Represent credentials and proofs in W3C VC formats (e.g. JWT/SD‑JWT‑VC or Data Integrity profiles)

Be transported using OpenID4VCI for issuance and OpenID4VP for presentations

Interoperate with verifiers that support advanced ZKP‑proof types

Only support “classic” JWT/SD‑JWT verification (graceful degradation / dual‑path designs)

RQ5:

Evaluation and recommendations – To what extent does the proposed architecture:

Meet the ETSI TR 119 476 criteria for privacy‑preserving credentials

Achieve practical performance for mobile wallets and verifiers

Provide a realistic migration path for Yivi towards EUDI‑compliant, ECDSA‑based ZKP credentials?

What recommendations can be made to Yivi for:

Short‑term experimentation (e.g. Longfellow‑style wrapping of existing credentials)

Long‑term architecture choices (e.g. adoption of BBS# or hybrid designs)

Student Profile We are looking for a motivated university‑level student in Computer Science, Cyber Security or a closely related discipline. You have a strong affinity with cryptography, digital identity, and privacy‑preserving technologies, and you are eager to apply academic knowledge to a real‑world, high‑impact use case. You work independently, think analytically, and are comfortable exploring complex technical concepts.

Thesis Benefits

Professional supervision from specialists in cryptography, identity management, and EUDI Wallet technologies

Regular feedback and technical sparring sessions throughout the thesis process

Access to technical documentation, development environments, and research materials relevant to the assignment

A monthly thesis compensation of €500 (based on a 40‑hour commitment; exceptions possible)

Flexible working arrangements, including hybrid work options

Opportunities to publish or present your research within the organization

Real‑world impact: your work may directly contribute to the integration of Yivi as an EUDI Wallet

References Academic

Anonymous credentials from ECDSA: https://eprint.iacr.org/2024/2010

Privacy‑Preserving Credentials – Camenisch et al: https://eprint.iacr.org/2014/468.pdf

ETSI TR 119 476 – Electronic Signatures and Trust Infrastructures: https://www.etsi.org/deliver/etsi_tr/119400_119499/119476/01.02.01_60/tr_119476v010201p.pdf

BBS# and eIDAS 2.0: https://csrc.nist.gov/csrc/media/presentations/2024/wpec2024-3b3/images-media/wpec2024-3b3-slides-antoine-jacques--BBS-sharp-eIDAS2.pdf

Other

What is Yivi: https://docs.yivi.app/what-is-yivi

IRMAGO: https://github.com/privacybydesign/irmago

EUDI Wallet ARF – EU Commission: https://eudi.dev/2.5.0/architecture-and-reference-framework-main/

Contact Primary Contact Person

Dibran Mulder, CTO Caesar Groep & Yivi

+31 (0)6 39 30 61 18

d.mulder@caesar.nl

Address:

Janssoniuslaan 80 3528 AJ Utrecht

Websites:

https://yivi.app

https://caesar.nl

Seniority Level Not Applicable

Employment Type Full-time

Job Function Information Technology

Industries IT Services and IT Consulting

#J-18808-Ljbffr

Ready to Apply?

Don't miss this opportunity! Apply now and join our team.

Functiedetails

Publicatiedatum: March 14, 2026
Functietype: Kunst en Entertainment
Locatie: Utrecht, Netherlands
Company: Yivi App

Ready to Apply?

Don't miss this opportunity! Apply now and join our team.