• Work updates
  • Evernym approach to connection reuse in LibVCX
  • Architecture for Aries KMS

Note: This call is Recorded. Recordings posted at the bottom of the page.


(7AM Los Angeles, 10AM New York, 3PM London, 4PM CET, 18H Moscow)

Remember the Hyperledger Code of Conduct

Anti-Trust Policy:

Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.

Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.


  • Michael Lodder (Sovrin Foundation) <>
  • Stephen Curran (Cloud Compass/BC Gov) <>
  • Ken Ebert Ken Ebert (Sovrin Foundation) <>
  • Richard Esplin (Evernym) <>
  • Marvin Berstecher (esatus AG) <>
  • Nikita Khateev (DSR) <>
  • Echo Harker (Evernym) <>
  • @Kumaravel N (Ford) <>
  • Darko Kulic (Evernym) <>
  • Steve McCown (Anonyome Labs) <>

Welcome / Introductions


  • Hyperledger Diversity, Civility, and Inclusivity Survey
  • IIW April 28-30

Related Calls

  • Previous Aries Working Group calls
  • DIF DIDComm WG Call: Rolling Agenda.
  • Identity Implementors Working Group call
    • Main place to get project updates, release status, and announcements.

Release Status and Work Updates

  • Aries Protocol Test Suite
    • Issue, credential, and proof tests are merged.
  • Aries Shared:
    • indy-vdr (Andrew Whitehead)
      • Remaining work: Design doc, FFI, testing, CI / CD
      • As an Aries interface becomes standardized, will add that API layer
    • indy-credx and aries-credx
    • Aries-Shared-Util
      • Pack / Unpack
      • Not started yet
    • Aries-KMS
      • Mike Lodder working on documentation and architecture as an Aries RFC (KMS architecture) and Ursa RFC (API)
        • Differs from Indy Wallet architecture by separating out auth and access control. Intention is to ensure a smooth transition from Indy.
        • Ability to export keys under certain conditions (metadata is set upon key creation)
      • Mike and Cam's aries-core-rs → aries-mayaguez
        • Evolution from lox
        • Will include a default storage that is not a different implementation from the plugins
      • Indy wallet crate might move to start another aries-kms implementation → aries-kms-vostok
  • Aries-CloudAgent-Python (
    • Release 0.4.5 is on PyPi.
    • Revocation support has merged into master and is likely to included in the next release. Some smoothing of the edges happening.
      • Note: uses anoncreds 1.0 (hence, tails files) and so will be constrained in use cases to those with small numbers of credentials (e.g. ~25k per RevReg.
  • Aries-Framework-Go (Troy) #aries-go
    • Enable common JavaScript API for both WASM and REST controller APIs.
    • Verifiable Credential controller APIs (validation and storage).
    • Preparing 0.1.2 release
  • Aries-SDK-Ruby (Jack)
  • Aries-Framework-DotNet (Tomislav)
    • Release last week for Aries compatibility with ACApy and LibVCX (RFC 0094)
  • Aries-StaticAgent-Python
  • Aries-Toolbox
    • Added basic message admin
    • Working on a getting started video
  • Aries-SDK-Java
  • Aries-Framework-JavaScript / Aries-SDK-JavaScript
  • Rich Schemas and W3C Verifiable Credentials (Brent & Ken)
  • Ursa
    • 0.3.2 released in February, includes key exchange methods (can replace libsodium)

RFC Progress

Other Business

  • Evernym approach to connection reuse in LibVCX Sergey Minaev and Darko Kulic
  • Aries KMS design Mike Lodder
    • Architecture RFC
    • 3rd party libraries we could leverage:
      • Google Tink as an encryption library used in the KMS for aries-framework-go

Future Topics

Action items


Call Recording

  • No labels