@4vx9j6w1
Credential leasing allows temporary access via time-bound VCs issued by DIDs. Users delegate privileges (e.g., "guest access for 24 hours") using proxy re-encryption, where a third party can decrypt data only during the lease period. Smart contracts automate expiration, revoking access afterward. Multi-signature approvals ensure leases align with organizational policies, while audit trails track usage for compliance.