Bach Khoa University · BKISC pilot

Tamper-proof student credentials, verifiable by anyone, anywhere.

Issuers anchor a Merkle root on Sepolia and pin a redacted artifact to IPFS. Verifiers check the credential against the chain — without trusting the HCMUT backend.

Why trustless?

  • The verifier only needs the credential file, a public RPC endpoint, and an IPFS gateway.
  • Selective disclosure (SD-JWT) — students choose which claims to share with each verifier.
  • Issuers are publicly enrolled in an on-chain registry; impostors fail the first check.
1

Issuer signs

Staff selects a template, uploads a CSV, and the system anchors the batch Merkle root on Sepolia.

2

Holder downloads

The student receives an SD-JWT file and chooses which fields to include before sharing.

3

Verifier checks

Anyone runs the verify SDK or visits /verify — six independent checks against the chain.