Skip to main content
European CommissionEBSI European Blockchain

Compute

The compute commands provide powerful cryptographic operations and utility functions for working with EBSI services. These commands handle everything from credential creation and verification to transaction processing and data encoding.

Compute Categories

Credentials

Create, verify, and manage verifiable credentials and presentations using various cryptographic algorithms.

Transaction

Sign transactions, decode transaction data, and compute blockchain-related identifiers.

Encoding

Encode and decode data in various formats including Base64, Base64URL, hex, and JWT.

Hash

Generate random IDs, compute hashes, and create schema identifiers.

Utils

Utility functions for key operations, address computation, time handling, and more.

Conformance

Specialized commands for conformance testing and validation scenarios.

Supported Algorithms

The compute commands support multiple cryptographic algorithms:

  • ES256K: Elliptic Curve Digital Signature Algorithm with secp256k1 curve
  • ES256: Elliptic Curve Digital Signature Algorithm with P-256 curve
  • RS256: RSA Signature with SHA-256
  • EdDSA: Edwards Curve Digital Signature Algorithm

Common Use Cases

  • Credential Management: Create and verify verifiable credentials
  • Transaction Processing: Sign and decode blockchain transactions
  • Data Encoding: Convert between different data formats
  • Key Operations: Generate and manage cryptographic keys
  • Conformance Testing: Validate implementations against EBSI standards

Credentials

Commands for creating, verifying, and managing verifiable credentials and presentations.

Transaction

Commands for signing transactions and decoding transaction data.

Encoding

Commands for encoding and decoding data in various formats.

Hash

Commands for generating random IDs and computing hashes.

Conformance

Commands for conformance testing and validation.

Utils

Utility commands for various computations and operations.