<cid>
) to request for a verification key of the VC with a GET request method. The verification key can then be used to decrypt the VC's digital signature to obtain a hash value. The verifier can be certained that the VC has not been tempered if the obtained hash matches with the VC's hash.