If the database get compromised the user data should not be leaked, that is why it should be encrypted and decrypted on database layer.
- claim of user
- verifiable credentials
Data which needs to be encrypted:
[identity-docs]->key->secret
[key-collection]->keys->0->secret
[key-collection]->keys->1->secret
....
[key-collection]->keys->4095->secret
[users]->claim
[users]->verifiableCredentials->0
[users]->verifiableCredentials->1
....
[users]->verifiableCredentials->X
[verifiable-credentials]->vc->credentialSubject
If the database get compromised the user data should not be leaked, that is why it should be encrypted and decrypted on database layer.
Data which needs to be encrypted:
[identity-docs]->key->secret
[key-collection]->keys->0->secret
[key-collection]->keys->1->secret
....
[key-collection]->keys->4095->secret
[users]->claim
[users]->verifiableCredentials->0
[users]->verifiableCredentials->1
....
[users]->verifiableCredentials->X
[verifiable-credentials]->vc->credentialSubject