KERI / CESR / ACDC Glossary
A
ACDC #acdc

authentic chained data container

version 1, commit c1a1c4a, created 2022-08-15, contributors Henk van Cann

ADC #acdc

Authentic data container

version 1, commit 3e9034a, created 2022-08-15, contributors Henk van Cann

agency #acdc

Agents can be people, edge computers and the functionality within wallets. The service an agent offers is agency.

version 1, commit b79a614, created 2022-07-30, contributors Henk van Cann

agent #acdc

A representative for an identity. MAY require the use of a wallet. MAY support transfer.

version 2, commit d8d9b97, created 2022-07-30, last modified 2022-08-29, contributors Henk van Cann

AID #acdc

Autonomic identifier

version 1, commit 1963c0d, created 2022-08-15, contributors Henk van Cann

ambient verifiability #acdc

Verifiable by anyone, anywhere, at anytime. E.g. Ambient Duplicity Detection describes the possibility of detecting duplicity by anyone, anywhere, anytime.

version 1, commit 5dc5d5d, created 2022-07-30, contributors Henk van Cann

AN #acdc

Autonomic namespace

version 1, commit fddab2a, created 2022-08-15, contributors Henk van Cann

APC #acdc

Authentic provenance chain

version 1, commit 4eff46c, created 2022-08-15, contributors Henk van Cann

API #acdc

Application programming interface

version 1, commit 493020e, created 2022-08-28, contributors Henk van Cann

append only event logs #acdc

Append-only is a property of computer data storage such that new data can be appended to the storage, but where existing data is immutable.

A blockchain is an example of an append-only log. The events can be transactions. Bitcoin is a well-known Append only log where the events are totally ordered and signed transfers of control over unspent transaction output.

More on Wikipedia

version 2, commit da8f39c, created 2022-07-30, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

application programming interface #acdc

An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software interface, offering a service to other pieces of software.

version 1, commit d639cb9, created 2022-08-28, contributors Henk van Cann

authentic chained data container #acdc

In brief, an ACDC or ADC proves digital data consistency and authenticity in one go. An ACDC cryptographically secures commitment to data contained, and its identifiers are self-addressing, which means they point to themselves and are also contained ìn the data.

version 2, commit dcc6a85, created 2022-08-15, last modified 2022-08-28, contributors Henk van Cann

authentic data container #acdc

A mechanism for conveying data that allows the authenticity of its content to be proved.

version 1, commit 55100a1, created 2022-08-15, contributors Henk van Cann

authentic provenance chain #acdc

Interlinked presentations of evidence that allow data to be tracked back to its origin in an objectively verifiable way.

version 1, commit 8d9638e, created 2022-08-15, contributors Henk van Cann

authentic web #acdc

The authentic web is the internet as a whole giant verifiable data structure. Also called Web5. The web will be one big graph. That's the mental model of the 'authentic web'.

version 2, commit 43e8785, created 2022-10-18, last modified 2022-10-18, contributors Henk van Cann

authenticity #acdc

The quality of having an objectively verifiable origin; contrast veracity. When a newspaper publishes a story about an event, every faithful reproduction of that story may be authentic — but that does not mean the story was true (has veracity).

version 3, commit 5904690, created 2021-08-02, last modified 2021-08-02, contributors Daniel Hardman

authoritative #acdc

Established control authority over an identifier, that has received attestations to it, e.g. control over the identifier has been verified to its root-of-trust. So the (control over the) identifier is 'authoritative' because it can be considered accurate, renowned, honourable and / or respected.
Also used to describe PKI key pairs that have this feature.

version 6, commit 80d6227, created 2022-08-15, last modified 2022-10-19, contributors Henk van Cann

authority #acdc

Authority in ToIP glossary

version 2, commit b12f08c, created 2022-08-15, last modified 2022-08-15, contributors Henk van Cann

authorization #acdc

Is the function of specifying access rights/privileges to resources, which is related to general information security and computer security, and to access control in particular.

More formally, "to authorize" is to define an access policy.

version 1, commit 3d68c33, created 2022-08-28, contributors Henk van Cann

authorized vlei representative #acdc

Also 'AVR'. This a representative of a Legal Entity that are authorized by the DAR of a Legal Entity to request issuance and revocation of:

  • vLEI Legal Entity Credentials
  • Legal Entity Official Organizational Role vLEI Credentials (OOR vLEI Credentials)
  • Legal Entity Engagement Context Role vLEI Credentials (ECR vLEI Credentials).

Paraphrased by @henkvancann from source Draft vLEI Ecosystem Governance Framework Glossary.

version 2, commit afcdcd9, created 2022-08-17, last modified 2022-08-17, contributors Henk van Cann

autonomic computing systems #acdc

Self managing computing systems using algorithmic governance, from the 90's way way way before DAOs. KERI creator Sam Smith worked at funded Navy research in the 90's on autonomic survivable systems as in "self-healing" systems: "We called them autonomic way back then".

version 2, commit 29cdfc6, created 2022-07-30, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

autonomic identifier #acdc

An identifier that is self-certifying and self-sovereign.

version 10, commit c3f5c69, created 2022-08-15, last modified 2022-08-26, contributors Henk van Cann

autonomic identity system #acdc

There's nobody that can intervene with the establishment of the authenticity of a control operation because you can verify all the way back to the root-of-trust.

version 3, commit ac33bf4, created 2022-07-30, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

autonomic namespace #acdc

A namespace that is self-certifying and hence self-administrating. ANs are therefore portable = truly self sovereign.

version 2, commit 6366df4, created 2022-08-15, last modified 2022-08-28, contributors Henk van Cann

AVR #acdc

Authorized vLEI Representative

version 1, commit 170e36c, created 2022-08-17, contributors Henk van Cann

B
backer #acdc

The terms Backer and Witness are closely related in KERI. Backers include both regular KERI witnesses and ledger-registered backers.

version 6, commit c44a2df, created 2022-07-30, last modified 2022-08-28, contributors Henk van Cann - Daniel Hardman

BADA #acdc

Best available data acceptance mechanism

version 1, commit b6c824d, created 2022-08-15, contributors Henk van Cann

base64 #acdc

In computer programming, Base64 is a group of binary-to-text encoding schemes that represent binary data (more specifically, a sequence of 8-bit bytes) in sequences of 24 bits that can be represented by four 6-bit Base64 digits.

More on source Wikipedia

version 1, commit 11852dd, created 2022-08-06, contributors Henk van Cann

best available data acceptance mechanism #acdc

The BADA security model provides a degree of replay attack protection. The attributate originator (issuer, author, source) is provided by an attached signature couple or quadruple. A single reply could have multiple originators. When used as an authorization the reply attributes may include the identifier of the authorizer and the logic for processing the associated route may require a matching attachment. BADA is part of KERI's Zero Trust Computing Architecture for Data Management: How to support Secure Async Data Flow Routing in KERI enabled Applications.

version 3, commit 24dcaff, created 2022-08-15, last modified 2022-10-19, contributors Henk van Cann

BFT #acdc

Byzantine fault tolerance

version 1, commit 9580fc2, created 2022-08-15, contributors Henk van Cann

binding #acdc

In short, the technique of connecting two data elements together. In the context of KERI it's the association of data or an identifier with another identifier or a subject (a person, organization or machine), thereby lifting the privacy of the subject through that connection, i.e. binding.

version 2, commit 3457ec2, created 2022-07-30, last modified 2022-10-19, contributors Henk van Cann

blake3 #acdc

BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2.

version 1, commit 6c27eac, created 2022-08-06, contributors Henk van Cann

blind oobi #acdc

A blind OOBI means that you have some mechanisms in place for verifying the AID instead of via the OOBI itself. A blind OOBI is essentially a URL. It's called "blind" because the witness is not in the OOBI itself. You haves other ways of verifying the AID supplied.

version 4, commit 6faf4f6, created 2022-08-23, last modified 2022-08-23, contributors Henk van Cann

branch #acdc

In software development a 'branch' refers to the result of branching: the duplication of an object under version control for further separate modification.

version 1, commit b9c4485, created 2022-08-05, contributors Henk van Cann

byzantine agreement #acdc

(non PoW) Byzantine Agreement is Byzantine fault tolerance of distributed computing systems that enable them to come to consensus despite arbitrary behavior from a fraction of the nodes in the network. BA consensus makes no assumptions about the behavior of nodes in the system. Practical Byzantine Fault Tolerance (pBFT) is the prototypical model for Byzantine agreement, and it can reach consensus fast and efficiently while concurrently decoupling consensus from resources (i.e., financial stake in PoS or electricity in PoW).

version 2, commit 511c56a, created 2022-07-30, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

byzantine fault tolerance #acdc

A Byzantine fault (also interactive consistency, source congruency, error avalanche, Byzantine agreement problem, Byzantine generals problem, and Byzantine failure) is a condition of a computer system, particularly distributed computing systems, where components may fail and there is imperfect information on whether a component has failed. The term takes its name from an allegory, the "Byzantine Generals Problem", developed to describe a situation in which, in order to avoid catastrophic failure of the system, the system's actors must agree on a concerted strategy, but some of these actors are unreliable. In a Byzantine fault, a component such as a server can inconsistently appear both failed and functioning to failure-detection systems, presenting different symptoms to different observers. It is difficult for the other components to declare it failed and shut it out of the network, because they need to first reach a consensus regarding which component has failed in the first place. Byzantine fault tolerance (BFT) is the dependability of a fault-tolerant computer system to such conditions.

version 1, commit 84b5226, created 2022-08-15, contributors Henk van Cann

C
certificate transparency #acdc

Certificate Transparency (CT) is an Internet security standard and open source framework for monitoring and auditing digital certificates. The standard creates a system of public logs that seek to eventually record all certificates issued by publicly trusted certificate authorities, allowing efficient identification of mistakenly or maliciously issued certificates. As of 2021, Certificate Transparency is mandatory for all SSL/TLS certificates.

version 3, commit 6167cf2, created 2022-07-31, last modified 2022-08-15, contributors Henk van Cann

CESR #acdc

composable event streaming representation

version 1, commit 2fa6c5c, created 2022-08-15, contributors Henk van Cann

cesr proof signatures #acdc

CESR Proof Signatures are an extension to the Composable Event Streaming Representation [CESR] that provide transposable cryptographic signature attachments on self-addressing data (SAD) [SAID]. Any SAD, such as an Authentic Chained Data Container (ACDC) Verifiable Credential [ACDC] for example, may be signed with a CESR Proof Signature and streamed along with any other CESR content. In addition, a signed SAD can be embedded inside another SAD and the CESR proof signature attachment can be transposed across envelope boundaries and streamed without losing any cryptographic integrity.
(Philip Feairheller, IETF-cesr-proof)

version 4, commit ddbe801, created 2022-07-31, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

Chains together a sequence of Disclosees which may also include a set of constraints on data usage by both second and third parties expressed in legal language such that the constraints apply to all recipients of the disclosed data thus the phrase "chain link" confidentiality. Each Disclosee in the sequence in turn is the Discloser to the next Disclosee.

This is the primary mechanism of granting digital data rights through binding information exchange to confidentiality laws. Confidentiality is dynamically negotiated on a per-event, per-data exchange basis according to the data that is being shared in a given exchange.

version 2, commit 6e28022, created 2022-09-06, last modified 2022-11-08, contributors Kent Bull - Henk van Cann

chain of custody #acdc

From Wikipedia (Source): Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. Of particular importance in criminal cases, the concept is also applied in civil litigation and more broadly in drug testing of athletes and in supply chain management, e.g. to improve the traceability of food products, or to provide assurances that wood products originate from sustainably managed forests.

version 1, commit a92ca88, created 2022-08-15, contributors Henk van Cann

claim #acdc

An assertion of the truth of something, typically one which is disputed or in doubt. A set of claims might convey personally identifying information: name, address, date of birth and citizenship, for example. (Source).

version 1, commit b01dd69, created 2022-07-31, contributors Henk van Cann

CLC #acdc

Chain link confidential

version 1, commit 1e38118, created 2022-10-06, contributors Henk van Cann

clone #acdc

A copy of a system that is - and works exactly as the original

version 2, commit 3b2a1c0, created 2022-08-05, last modified 2022-08-28, contributors Henk van Cann

cloud agent #acdc

Cloud agent is software that is installed on the cloud server instances in order to provide security, monitoring, and analysis solutions for the cloud. They actually provide information and helps to provide control over cloud entities.
Paraphrased by @henkvancann based on source.
Also see Agent.

version 2, commit 9c04ff8, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

code table #acdc

version 2, commit 4864c90, created 2022-10-02, last modified 2022-10-02, contributors Henk van Cann

code table selector #acdc

the first character in the text code of CESR stream that determines which code table to use, either a default code table or a code table selector character when not the default code table. Thus the 1 character text code table must do double duty. It must provide selectors for the different text code tables and also provide type codes for the most popular primitives that have a pad size of 1 that appear is the default code table.

version 2, commit 125f8fb, created 2022-10-02, last modified 2022-10-02, contributors Henk van Cann

cold start stream parsing #acdc

After a reboot (or cold start), a stream processor looks for framing information to know how to parse groups of elements in the stream.

If that framing information is ambiguous then the parser may become confused and require yet another cold start. While processing a given stream a parser may become confused especially if a portion of the stream is malformed in some way. This usually requires flushing the stream and forcing a cold start to resynchronize the parser to subsequent stream elements.

version 1, commit e0ef4f2, created 2022-10-11, contributors Henk van Cann

collective signature #acdc

a group signature scheme, that (i) is shared by a set of signing groups and (ii) combined collective signature shared by several signing groups and several individual signers. The protocol of the first type is constructed and described in detail. It is possible to modify the described protocol which allows transforming the protocol of the first type into the protocol of the second type. The proposed collective signature protocols have significant merits, one of which is connected with possibility of their practical using on the base of the existing public key infrastructures.
Source

Collective signature have a variable length as a function of the number of signers.

version 1, commit 34aacc8, created 2022-09-27, contributors Henk van Cann

collision #acdc

In cryptography and identity collision generally refers to something going wrong because an identical result has been produced but it refers to - or points to - different sources or assets backing this result.

E.g. two hashes collide, meaning two different digital sources produce the same hash.
Another example is name(space) collision.

version 5, commit f18648f, created 2022-09-27, last modified 2022-09-27, contributors Henk van Cann

compact variant #acdc

Either a most compact version of an ACDC or the fully compact version of an ACDC. An Issuer commitment via a signature to any variant of ACDC (compact, full, etc) makes a cryptographic commitment to the top-level section fields shared by all variants of that ACDC because the value of a top level section field is either the SAD or the SAID of the SAD of the associated section.

version 5, commit 888c84f, created 2022-09-06, last modified 2022-10-11, contributors Henk van Cann

complementary integrity verification #acdc

A mechanism that can verify integrity independent of needing access to a previous instance or reference version of the information for comparison.
Source: Neil Thomson

version 2, commit b963227, created 2022-10-26, last modified 2022-10-26, contributors Henk van Cann

composability #acdc

Text binary concatenation composability

version 1, commit 50d185c, created 2022-09-28, contributors Henk van Cann

composable #acdc

Composability

version 1, commit 2fb340a, created 2022-09-28, contributors Henk van Cann

composable event streaming representation #acdc

This compact encoding scheme fully supports both textual and binary streaming applications of attached crypto material of all types. This approach includes composability in both the textual and binary streaming domains. The primitives may be the minimum possible but still composable size. Making composability a guaranteed property allows future extensible support of new compositions of streaming formats based on pre-existing core primitives and compositions of core primitives. This enables optimized stream processing in both the binary and text domains. Also called 'CESR'.

version 1, commit bf110b1, created 2022-08-15, contributors Henk van Cann

configuration files #acdc

In computing, configuration files (commonly known simply as config files) are files used to configure the parameters and initial settings for some computer programs. They are used for user applications, server processes and operating system settings.

More on source Wikipedia

version 1, commit f627d0c, created 2022-08-06, contributors Henk van Cann

consensus mechanism #acdc

How groups of entitities come to decisions. In general to learn about consensus mechanisms read any textbook on decision making, automated reasoning, multi-objective decision making, operations research etc.

version 2, commit b3c88af, created 2022-07-31, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

content addressable hash #acdc

Finding content by a hash of this content, generated by a one-way hash function applied to the content.

Content addressing is a way to find data in a network using its content rather than its location. The way we do is by taking the content of the content and hashing it. Try uploading an image to IPFS and get the hash using the below button.

version 2, commit 36d8713, created 2022-07-31, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

contextual linkability #acdc

Refers to the condition where vendors or other data capture points provide enough context at point of capture to be able to use statistical correlation with existing data sets to link any of a person's disclosed attributes to a set of already known data points about a given person.

This sort of linkability nullifies the perceived protection of selective disclosure through zero knowledge proofs since the disclosed data can be combined with context to easily link the disclosed data to an existing profile of the person.

These threats mainly focus on a subject (the entity) who wants to hide as much of his identifiable information (or at least make it as unlikable as possible). This can occur when the subject wants to authenticate himself to a certain service (multiple authentication principles are shown in the tree), but also during regular communication (browsing, client-server requests, etc.) by means of the contextual information connected or linked to the the activity or communication.
More at source

Contractually protected disclosure is the primary defense against contextual linkability.

version 6, commit 18a5c6a, created 2022-11-08, last modified 2022-11-08, contributors Henk van Cann - Kent Bull

contingent disclosure #acdc

{TBW prio 1}

version 1, commit ef502d0, created 2022-09-06, contributors Henk van Cann

contractually protected disclosure #acdc

Usage of schema-based and contract-based controls to limit the exchange of information to provide both mechanical and legal protection on the sharing of data.

Mechanical protection is composed of sharing the schema of the data to be shared prior to sharing the actual data contents. This mechanical protection is then combined through the IPEX protocol with disclosures of legal contracts to be agreed to prior to sharing the desired data contents.

Once the legal agreements have been met then the disclosure mechanism exchanges the desired data contents.

This is also the most elaborate form of disclosure by an IPEX. Contractually protected disclosure includes both chain-link confidential and contingent disclosure.
Paraphrased by @henkvancann based on source

version 5, commit e51b46b, created 2022-09-06, last modified 2022-11-08, contributors Kent Bull - Henk van Cann

control authority #acdc

In identity systems Control Authority is who controls what and that is the primary factor in determining the basis for trust in them. The entity with control authority takes action through operations that affect the

  • creation (inception)
  • updating
  • rotation
  • revocation
  • deletion
  • and delegation of the authentication factors and their relation to the identifier.

version 3, commit 2fbff4f, created 2022-07-31, last modified 2022-11-02, contributors Henk van Cann - Daniel Hardman

controller #acdc

The entity that has the ability to make changes to an identity, cryptocurrency or verifiable credential.

The controller of an autonomic identifier is the entity (person, organization, or autonomous software) that has the capability, as defined by derivation, to make changes to an Event Log. This capability is typically asserted by the control of a single inception key. In DIDs this is typically asserted by the control of set of cryptographic keys used by software acting on behalf of the controller, though it may also be asserted via other mechanisms. In KERI an AID has one single controller. Note that a DID may have more than one controller, and the DID subject can be the DID controller, or one of them.

version 3, commit b3199a6, created 2022-07-09, last modified 2022-10-03, contributors Henk van Cann

coroutines #acdc

Computer programs that can be suspended and resumed at will.

version 2, commit fdb1520, created 2022-08-05, last modified 2022-08-05, contributors Henk van Cann

correlation #acdc

In our scope this is an identifier used to indicate that external parties have observed how wallet contents are related.

version 2, commit 6806c47, created 2022-08-02, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

count code #acdc

Group framing code

version 1, commit c56fbe6, created 2022-09-29, contributors Henk van Cann

credential #acdc

Evidence of authority, status, rights, entitlement to privileges, or the like.
(source)

version 2, commit 611106d, created 2022-07-09, last modified 2022-07-09, contributors Henk van Cann

CRUD #acdc

Is acronym for the traditional client-server database update policy is CRUD (Create, Read, Update, Delete).

CRUD as opposed to RUN which is the acronym for the new peer-to-peer end-verifiable monotonic update policy.

version 2, commit beb41f0, created 2022-10-17, last modified 2022-10-19, contributors Henk van Cann

crypto libraries #acdc

Cryptography libraries deal with cryptography algorithms and have API function calls to each of the supported features.

version 2, commit 79368e2, created 2022-08-02, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

cryptocurrency #acdc

A digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a digital ledger or computerized database using strong cryptography to secure transaction record entries, to control the creation of additional digital coin records.
See more on source Wikipedia.

version 3, commit 12f1055, created 2022-08-02, last modified 2022-08-28, contributors Henk van Cann - Daniel Hardman

cryptographic commitment scheme #acdc

is a cryptographic primitive that allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability to reveal the committed value later.

Commitment schemes are designed so that a party cannot change the value or statement after they have committed to it: that is, commitment schemes are binding.
More on wikipedia

version 2, commit 9b995b8, created 2022-08-02, last modified 2022-08-03, contributors Henk van Cann

cryptographic primitive #acdc

Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hash functions and encryption functions.
More on source Wikipedia-page

version 1, commit e976c55, created 2022-09-29, contributors Henk van Cann

cryptographic strength #acdc

The term "cryptographically strong" is often used to describe an encryption algorithm, and implies, in comparison to some other algorithm (which is thus cryptographically weak), greater resistance to attack. But it can also be used to describe hashing and unique identifier and filename creation algorithms.
More on Wikipedia

version 1, commit 5bf88aa, created 2022-08-02, contributors Henk van Cann

cryptonym #acdc

A code name, call sign or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person.
Source Wikipedia

version 3, commit 6a767dc, created 2022-08-05, last modified 2022-08-05, contributors Henk van Cann

CT #acdc

Certificate transparency

version 1, commit e9238d0, created 2022-08-15, contributors Henk van Cann

custodial agent #acdc

An agent owned by an individual who has granted signing authority to a custodian who is usually also the host of the running agent software. Using partial rotation to facilitate custodial key management the owner of the identifier retains rotational authority and thus the ability to "fire" the custodian at any time without requiring the cooperation of the custodian.

version 5, commit 942849a, created 2022-08-23, last modified 2022-08-23, contributors Henk van Cann

custodial rotation #acdc

Rotation based on control authority that is split between two key sets. The first for signing authority and the second (pre-roateted) for rotation authority the associated thresholds and key list can be structured in such a way that a designated custodial agent can hold signing authority while the original controller can hold exclusive rotation authority.

Partial pre-rotation supports the important use case that of custodial key rotation to authorize a custodial agent.
Paraphrased by @henkvancann on the bases of the IETF-KERI draft 2022 by Samual Smith.

version 1, commit 14436cc, created 2022-08-23, contributors Henk van Cann

D
DAG #acdc

Directed acyclic graph

version 1, commit 26c46f1, created 2022-08-15, contributors Henk van Cann

DAR #acdc

Designated Authorized Representatives

version 1, commit 500b7cc, created 2022-08-17, contributors Henk van Cann

data anchor #acdc

Data anchors are digests of digital data, that uniquely identify this data. The digest is the anchor and can be used to identify - and point to the data at the same time.

version 2, commit 5e97bbe, created 2022-08-06, last modified 2022-08-28, contributors Henk van Cann

decentralized identifier #acdc

Decentralized identifiers (DIDs) are a new type of identifier that enables verifiable, decentralized digital identity. A DID refers to any subject (e.g., a person, organization, thing, data model, abstract entity, etc.) as determined by the controller of the DID.
Source W3C.org.

version 1, commit 962a9ac, created 2022-08-19, contributors Henk van Cann

decentralized identity #acdc

is a technology that uses cryptography to allow individuals to create and control their own unique identifiers. They can use these identifiers to obtain Verifiable Credentials from trusted organizations and, subsequently, present elements of these credentials as proof of claims about themselves. In this model, the individual takes ownership of their own identity and need not cede control to centralized service providers or companies.

KERIs definition of decentralization (centralization) is about control not spatial distribution. In our definition decentralized is not necessarily the same as distributed. By distributed we mean that activity happens at more than one site. Thus decentralization is about control and distribution is about place. To elaborate, when we refer to decentralized infrastructure we mean infrastructure under decentralized (centralized) control no matter its spatial distribution. Thus decentralized infrastructure is infrastructure sourced or controlled by more than one entity.

version 1, commit 96d7c11, created 2022-08-15, contributors Henk van Cann

decentralized key management infrastructure #acdc

Decentralized Public Key Infrastructure (DPKI) or Decentralized Key Management System (DKMS) goal is to ensure that no single third-party can compromise the integrity and security of the system as as whole.
Source

version 1, commit cd56f22, created 2022-08-15, contributors Henk van Cann

DEL #acdc

Duplicitous event log

version 1, commit cfd8a9f, created 2022-08-15, contributors Henk van Cann

delegated identifier #acdc

Matches the act of delegation with the appropriate digital twin. Consequently when applied recursively, delegation may be used to compose arbitrarily complex trees of hierarchical (delegative) key management event streams. This is a most powerful capability that may provide an essential building block for a generic universal decentralized key management infrastructure (DKMI) that is also compatible with the demand of generic event streaming applications.

More in the whitepaper

version 2, commit 935792c, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

delegation #acdc

A person or group of persons officially elected or appointed to represent another or others.

version 1, commit c478921, created 2022-08-06, contributors Henk van Cann

derivation code #acdc

All crypto material appears in KERI in a fully qualified representation. This includes a derivation code prepended to the crypto-material.

version 3, commit 7ce8423, created 2022-08-02, last modified 2022-08-28, contributors Henk van Cann

designated authorized representative #acdc

Also 'DAR'. These are representatives of a Legal Entity that are authorized by the Legal Entity to act officially on behalf of the Legal Entity. DARs can authorize:

  1. vLEI Issuer Qualification Program Checklists
  2. execute the vLEI Issuer Qualification Agreement
  3. provide designate/replace Authorized vLEI Representatives (AVRs).

Paraphrased by @henkvancann from source Draft vLEI Ecosystem Governance Framework Glossary.

version 2, commit 64659ca, created 2022-08-17, last modified 2022-08-17, contributors Henk van Cann

DHT #acdc

Distributed hash table

version 1, commit 415e2fc, created 2022-08-15, contributors Henk van Cann

DID #acdc

Decentralized Identifier

version 2, commit c07194b, created 2022-08-19, last modified 2022-08-19, contributors Henk van Cann

digest #acdc

verifiable cryptographic commitment. It's a collision resistant hash of content.

From Wikipedia (Source):

A digest is a cryptographic hash function (CHF) is a mathematical algorithm that maps data of an arbitrary size (often called the "message") to a bit array of a fixed size (the "hash value", "hash", or "message digest"). It is a one-way function, that is, a function for which it is practically infeasible to invert or reverse the computation.[1]

version 4, commit b7cb9f2, created 2022-07-09, last modified 2022-08-01, contributors Henk van Cann

digital signature #acdc

A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authentication), and that the message was not altered in transit (integrity).

version 1, commit 8409808, created 2022-07-09, contributors Henk van Cann

directed acyclic graph #acdc

From Wikipedia (source):

In mathematics, particularly graph theory, and computer science, a directed acyclic graph (DAG /ˈdæɡ/ (listen)) is a directed graph with no directed cycles. That is, it consists of vertices and edges (also called arcs), with each edge directed from one vertex to another.

A directed acyclic graph (DAG)

version 1, commit 86087bb, created 2022-08-15, contributors Henk van Cann

discloser #acdc

An ACDC in a disclosure is disclosed by the Discloser.

version 1, commit 2d9a4df, created 2022-09-06, contributors Henk van Cann

distributed hash table #acdc

It is a distributed system that provides a lookup service similar to a hash table: key-value pairs are stored in a DHT, and any participating node can efficiently retrieve the value associated with a given key. The main advantage of a DHT is that nodes can be added or removed with minimum work around re-distributing keys. Keys are unique identifiers which map to particular values, which in turn can be anything from addresses, to documents, to arbitrary data.
(Source: Wikipedia)

version 1, commit 2954b23, created 2022-08-15, contributors Henk van Cann

DKMI #acdc

Decentralized key management infrastructure

version 1, commit 92f2ae0, created 2022-08-15, contributors Henk van Cann

domain #acdc

Trust domain and / or Domain name

version 1, commit fc424c2, created 2022-09-28, contributors Henk van Cann

domain name #acdc

A domain name is a string that identifies a realm of administrative autonomy, authority or control within the Internet. Domain names are used in various networking contexts and for application-specific naming and addressing purposes.
More on Source Wikipedia.

version 1, commit b3355e6, created 2022-09-28, contributors Henk van Cann

DPKI #acdc

Decentralized key management infrastructure

version 1, commit 22bcc86, created 2022-08-15, contributors Henk van Cann

dual text binary encoding format #acdc

(ietf-cesr-proof)

{TBW prio2}

version 2, commit fd60936, created 2022-07-31, last modified 2022-07-31, contributors Henk van Cann

duplicitous event log #acdc

This is a record of inconsistent event messages produced by a given controller or witness with respect to a given KERL. The duplicitous events are indexed to the corresponding event in a KERL. A duplicitous event is represented by a set of two or more provably mutually inconsistent event messages with respect to a KERL. Each juror keeps a duplicitous event log (DEL) for each controller and all designated witness with respect to a KERL. Any validator may confirm duplicity by examining a DEL.

version 1, commit aa049ab, created 2022-08-15, contributors Henk van Cann

E
eclipse attack #acdc

An eclipse attack is a P2P network-based attack. Eclipse attack can only be performed on nodes that accept incoming connections from other nodes, and not all nodes accept incoming connections.

In a bitcoin network, by default, there are a maximum of 117 incoming TCP connections and 8 outgoing TCP connections.
Source

version 8, commit 178adbb, created 2022-09-06, last modified 2022-09-06, contributors Henk van Cann

ECR #acdc

Engagement context role

version 1, commit 87167f1, created 2022-08-17, contributors Henk van Cann

electronic signature #acdc

An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign. This type of signature has the same legal standing as a handwritten signature as long as it adheres to the requirements of the specific regulation under which it was created (e.g., eIDAS in the European Union, NIST-DSS in the USA or ZertES in Switzerland).

version 1, commit 4348e1a, created 2022-07-09, contributors Henk van Cann

end verifiable #acdc

When a log is end verifiable, it means that the log may be verified by any end user that receives a copy. No trust in intervening infrastructure is needed to verify the log and validate the content.

version 1, commit 049c88c, created 2022-08-02, contributors Henk van Cann

engagement context role #acdc

A person that represents the Legal Entity in a functional or in another context role and is issued an ECR vLEI Credential.

version 3, commit 9d1c81e, created 2022-08-17, last modified 2022-08-18, contributors Henk van Cann

entity #acdc

entity in the #essiflab glossary.

version 2, commit bdf6353, created 2022-08-15, last modified 2022-08-15, contributors Henk van Cann

entropy #acdc

Entropy

The term entropy is also used to describe the degree of unpredictability of a message. Entropy is then measured in bits. The degree or strength of randomness determines how difficult it would be for someone else to reproduce the same large random number. This is called collision resistance.

version 1, commit fdf5e4a, created 2022-08-02, contributors Henk van Cann

ephemeral #acdc

Lasting for a markedly brief time. Having a short lifespan.
In the context of identifiers is often referred to as identifiers for one time use; or throw-away identifiers.

version 1, commit cd33ec5, created 2022-08-05, contributors Henk van Cann

escrow #acdc

'Escrow' as a noun is a (legal) arrangement in which a third party temporarily holds money or property until a particular condition has been met.

'Escrow' as a verb: we use it in protocol design to handle out of order events. Store the event and wait for the other stuff to show up and then continue processing of the event. So escrowing is the process of storing this event. We root back to the event later.

version 3, commit c525cab, created 2022-10-04, last modified 2022-10-04, contributors Henk van Cann

escrow state #acdc

The current state of all the temporary storage locations (what events are waiting for what other information) that KERI protocol needs to keep track of, due to its fully asynchronous nature.

version 5, commit 7630297, created 2022-08-08, last modified 2022-08-11, contributors Henk van Cann

establishment event #acdc

An event that establishes control authority. What are the authoritative key-pairs in any point in time. For a trivial system this is one authoritative key pair and it never changes. However, if we need persistance in our identifier and we want to be able to for example overcome compromise of our keys, we need to be able to do something like rotate keys.
Source Sam Smith

version 2, commit e504bae, created 2022-08-02, last modified 2022-08-05, contributors Henk van Cann

extensible business reporting language #acdc

XBRL is the open international standard for digital business reporting, managed by a global not for profit consortium, XBRL International.

version 2, commit f9ae5d3, created 2022-10-18, last modified 2022-10-18, contributors Henk van Cann

F
first seen #acdc

"First seen" in KERI is the first verified event, accepted in the KEL. It has no effect on the timing of what has arrived in escrow for example; in escrow there can be garbage. Every 'first seen' event is propagated world wide within micro-seconds to the watchers. Only in this microseconds windows that you could have a live key conprise attack. If that happens, this where you have to look after this duplicity-attack a bit more in depth to handle it safely. E.g. a valid key rotation.

version 1, commit 24fa4bb, created 2022-07-30, contributors Henk van Cann

frame code #acdc

Group framing code

version 1, commit ba1435a, created 2022-09-29, contributors Henk van Cann

fully compact #acdc

The most compact form of an ACDC. This is the only signed variant of an ACDC and this signature is anchored in a transaction event log (TEL) for the ACDC. This is one valid choice for an ACDC schema.
This form is part of the graduated disclosure mechanism in ACDCs.

version 12, commit 34fb560, created 2022-10-11, last modified 2022-10-11, contributors Kent Bull - Henk van Cann

fully expanded #acdc

The most user-friendly version of an ACDC credential. It doesn't need to be signed and typically is not signed since the most compact version which is signed can be computed from this form and then the signature can be looked up in the transaction event log of the ACDC in question.

Regarding the graduated disclosure objective this form is the one with the highest amount of disclosure for a given node of an ACDC graph.

version 7, commit 6770120, created 2022-10-11, last modified 2022-10-11, contributors Henk van Cann - Kent Bull

G
GAR #acdc

GLEIF authorized representative

version 1, commit 9333119, created 2022-08-17, contributors Henk van Cann

ghost credential #acdc

Is a valid credential within in a 90 days grace period (the revocation transaction time frame before it's booked to revocation registry). {TBW prio 3}

version 3, commit d7e15a8, created 2022-08-16, last modified 2022-08-16, contributors Henk van Cann

GLEIF #acdc

Global Legal Entity Identifier Foundation

version 1, commit bf6bd39, created 2022-08-17, contributors Henk van Cann

gleif authorized representative #acdc

A representative of GLEIF authorized to perform the identity verifications requirements needed to issue the QVI vLEI Credential.

Source: Draft vLEI Ecosystem Governance Framework Glossary.

version 2, commit 17a0959, created 2022-08-17, last modified 2022-08-17, contributors Henk van Cann

GLEIS #acdc

Global Legal Entity Identifier System

version 1, commit 9bf10e1, created 2022-08-18, contributors Henk van Cann

governance framework #acdc

Also called 'Governance structure'. Governance frameworks are the structure of a government and reflect the interrelated relationships, factors, and other influences upon the institution. Governance frameworks structure and delineate power and the governing or management roles in an organization. They also set rules, procedures, and other informational guidelines.
More in source Wikipedia.

version 2, commit cc7d3fd, created 2022-08-18, last modified 2022-08-29, contributors Henk van Cann

GPG #acdc

Gnu privacy guard

version 1, commit 521bc34, created 2022-08-15, contributors Henk van Cann

graduated disclosure #acdc

disclosure performed by a presentation exchange that has cross-variant (see compact variant) Issuer commitment verifiability as an essential property. It supports graduated disclosure by the Disclosee of any or all variants wether it be full, compact, metadata, partial, selective, bulk issued, or contractually protected.
Paraphrased by @henkvancann based on source

version 4, commit 22340af, created 2022-09-06, last modified 2022-09-06, contributors Henk van Cann

graph fragment #acdc

An ACDC is a verifiable data structure and part of a graph, consisting of a node property and one or two edge proporties.

version 4, commit 7d6da19, created 2022-09-27, last modified 2022-09-27, contributors Henk van Cann

group code #acdc

Group framing code

version 1, commit 1763f1e, created 2022-09-29, contributors Henk van Cann

group framing code #acdc

special framing codes can be specified to support groups of primitives in CESR. Grouping enables pipelining. Other suitable terms for these special framing codes are group codes or count codes for short. These are suitable terms because these framing codes can be used to count characters, primitives in a group, or groups of primitives in a larger group when parsing and off-loading a stream of CESR primitives.
Source

version 1, commit 565c982, created 2022-09-29, contributors Henk van Cann

H
habery #acdc

The only hit (2022) in a Google search pointing to a github site 'habery DOT github DOT io' is NOT related.

version 1, commit fbeb062, created 2022-08-02, contributors Henk van Cann

hierarchical asynchronous coroutines and input output #acdc

Repo ioflo hio

version 1, commit e94791c, created 2022-08-15, contributors Henk van Cann

hierarchical composition #acdc

Encoding protocol that is composable in a hierarchy and enables pipelining (multiplexing and de-multiplexing) of complex streams in either text or compact binary. This allows management at scale for high-bandwidth applications.

version 1, commit 07d1380, created 2022-09-29, contributors Henk van Cann

hio #acdc

Weightless hierarchical asynchronous coroutines and I/O in Python.
Rich Flow Based Programming Hierarchical Structured Concurrency with Asynchronous IO.

version 1, commit 466c689, created 2022-08-05, contributors Henk van Cann

I
I O #acdc

Input output

version 1, commit d96ddcd, created 2022-08-15, contributors Henk van Cann

IANA #acdc

Internet assigned numbers authority

version 1, commit 745552f, created 2022-08-15, contributors Henk van Cann

identifier #acdc

Something to uniquely identify (public) identities; pointing to something or someone else.

version 2, commit 3db1d2e, created 2022-08-06, last modified 2022-08-15, contributors Henk van Cann

identifier system #acdc

Verifiable Credentials (VCs) and the emerging role of the LEI: Verifiable Credentials are digitally signed credentials that are not only tamper-resistant but capable of being verified in decentralized manner. vLEIs are based on the Trust over IP Authentic Chained Data Container (ACDC) specification (based on the Key Event Receipt Infrastructure (KERI) protocol (github.com/WebOfTrust/keri), both Internet Engineering Task Force (IETF) draft specifications). Verifiable Credentials are digitally signed credentials that are not only tamper-resistant but capable of being verified in decentralized manner. vLEIs are based on the Trust over IP Authentic Chained Data Container (ACDC) specification (based on the Key Event Receipt Infrastructure (KERI) protocol (github.com/WebOfTrust/keri), both Internet Engineering Task Force (IETF) draft specifications). More info on GLEIF site

version 3, commit d662dd7, created 2022-08-02, last modified 2022-08-02, contributors Henk van Cann

identity #acdc

A unique entity. Typically represented by a unique identifier.

version 5, commit 7a5f617, created 2022-08-02, last modified 2022-08-29, contributors Henk van Cann

inception #acdc

The operation of creating an AID by binding it to the initial set of authoritative keypairs and any other associated information. This operation is made verifiable and duplicity evident upon acceptance as the inception event that begins the AID's KEL.
Source Sam Smith

version 1, commit 0941f79, created 2022-08-05, contributors Henk van Cann

inception event #acdc

The inception data must include the public key, the identifier derivation from that public key, and may include other configuration data. The identifier derivation may be simply represented by the derivation code. A statement that includes the inception data with attached signature made with the private key comprises a cryptographic commitment to the derivation and configuration of the identifier that may be cryptographically verified by any entity that receives it.
A KERI inception statement is completely self-contained. No additional infrastructure is needed or more importantly must be trusted in order to verify the derivation and initial configuration (inception) of the identifier. The initial trust basis for the identifier is simply the signed inception statement.
(SamMSmith)

version 6, commit 3c3cc68, created 2022-08-02, last modified 2022-10-05, contributors Henk van Cann

inconsistency #acdc

If a reason, idea, opinion, etc. is inconsistent, different parts of it do not agree, or it does not agree with something else. Data inconsistency occurs when similar data is kept in different formats in more than one file. When this happens, it is important to match the data between files.

version 2, commit d5f131a, created 2022-08-02, last modified 2022-09-30, contributors Henk van Cann

indexed signature #acdc

An indexed signature attachment is used when signing anything with a multi-key autonomic identifier. The index is included as part of the attachment, so a verifier knows which of the multiple public keys was used to generate a specific signature.
Source:Philip Feairheller

version 3, commit 09429c7, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

input output #acdc

In computing, input/output (I/O, or informally io or IO) is the communication between an information processing system, such as a computer, and the outside world, possibly a human or another information processing system. Inputs are the signals or data received by the system and outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform I/O" is to perform an input or output operation.

version 2, commit bfaf2e5, created 2022-08-15, last modified 2022-08-15, contributors Henk van Cann

inquisitor #acdc

In the ACDC context it's a general term for someone (in a validating role) that launches an inquiry at some KERI witness.

version 2, commit bf5bdce, created 2022-08-08, last modified 2022-08-09, contributors Henk van Cann

integrity #acdc

Integrity (of a message or data) means that the information is whole, sound, and unimpaired (not necessarily correct). It means nothing is missing from the information; it is complete and in intended good order. (Source: Neil Thomson)

version 9, commit c0aca25, created 2022-10-25, last modified 2022-10-26, contributors Henk van Cann

interleaved serialisation #acdc

Serializations of different types interleaved in an overarching format

version 5, commit 503742c, created 2022-09-26, last modified 2022-09-26, contributors Henk van Cann

internal inconsistency #acdc

Internal is used to describe things that exist or happen inside an entity. In our scope of digital identifiers its (in)consistency is considered within the defining data structures and related data stores.

In KERI we are protected against internal inconsistency by the hash chain datastructure of the KEL, because the only authority that can sign the log is the controller itself.

version 2, commit 33c8026, created 2022-08-02, last modified 2022-10-25, contributors Henk van Cann

internet assigned numbers authority #acdc

Wikipedia

version 1, commit 02c9b04, created 2022-08-15, contributors Henk van Cann

interoperability #acdc

Interoperability is a characteristic of a product or system to work with other products or systems. While the term was initially defined for information technology or systems engineering services to allow for information exchange.
More on source Wikipedia

version 1, commit 70e29c1, created 2022-09-28, contributors Henk van Cann

interoperable #acdc

Interoperability

version 1, commit 5c621c2, created 2022-09-28, contributors Henk van Cann

IPEX #acdc

Issuance and presentation exchange protocol

version 1, commit 99c9362, created 2022-08-15, contributors Henk van Cann

issuance and presentation exchange protocol #acdc

provides a uniform mechanism for the issuance and presentation of ACDCs in a securely attributable manner.

version 2, commit 2c42d37, created 2022-08-15, last modified 2022-09-06, contributors Henk van Cann

issuance event #acdc

The initial transaction event log event anchored to the issuing AID’s key event log that represents the issuance of an ACDC credential.
Source: Philip Feairheller.

It's a sort of "inception event" of a verifiable credential.

version 3, commit 177c604, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

issuance exchange #acdc

A special case of a presentation exchange where the Discloser is the Issuer of the origin (Primary) ACDC of the DAG formed by the set of chained ACDCs so disclosed.

In an issuance exchange, when the origin ACDC has an Issuee, the Disclosee MAY also be the origin ACDC's Issuee.

version 1, commit 275b6e1, created 2022-09-06, contributors Henk van Cann

issuee #acdc

An ACDC is optionally issued to the Issuee. When present, the Issuee identifier (AID) appears at the top level of the attribute section or in the attribute list at the top level of the attribute aggregate section of the ACDC.

version 2, commit 40314ef, created 2022-09-06, last modified 2022-09-06, contributors Henk van Cann

issuer #acdc

An ACDC is issued by the Issuer. The Issuer identifier (AID) appears in the top level of the ACDC.

version 4, commit 801d4e9, created 2022-09-06, last modified 2022-09-06, contributors Henk van Cann

J
javascript object signing and encryption #acdc

Related: JWK, JWT. More info

version 1, commit 5baa5f8, created 2022-08-15, contributors Henk van Cann

JOSE #acdc

Javascript object signing and encryption

version 1, commit 249a061, created 2022-08-15, contributors Henk van Cann

judge #acdc

determines current authoritative key set for identifier from the key event receipt logs from a set of witnesses. Judges transmit the 'judgement' of watchers concerning duplicity.

version 2, commit 0d57865, created 2022-08-01, last modified 2022-09-06, contributors Henk van Cann

K
KA2CE #acdc

KERI agreement algorithm for control establishment

version 1, commit 7c3738c, created 2022-08-15, contributors Henk van Cann

KAACE #acdc

KERI agreement algorithm for control establishment

version 1, commit 023c4de, created 2022-08-15, contributors Henk van Cann

keep #acdc

Is KERI's and ACDC's user interface that uses the keripy agent for its backend. It uses the REST API exposed from the keripy agent.
Source: Philip Feairheller

version 3, commit 8ae0b62, created 2022-08-06, last modified 2022-08-09, contributors Henk van Cann

KEL #acdc

Key event log

version 1, commit 28c84a5, created 2022-08-15, contributors Henk van Cann

KERI #acdc

Key event receipt infrastructure

version 1, commit 7674650, created 2022-08-15, contributors Henk van Cann

keri command line interface #acdc

IIW34 presentation slides

version 1, commit 71f01d1, created 2022-08-15, contributors Henk van Cann

keri improvement doc #acdc

These docs are modular so teams of contributors can independently work and create PRs of individual KIDs; KIDs answer the question "how we do it". We add commentary to the indivudual KIDs that elaborate on the why. It has been split from the how to not bother implementors with the why.

version 1, commit 922f8e9, created 2022-08-15, contributors Henk van Cann

keri ox #acdc

The RUST programming-language implementation of the KERI protocol.

version 1, commit 8f7e3af, created 2022-11-02, contributors Henk van Cann

keridemlia #acdc

It is a contraction of KERI and Kademlia. It's the distributed database of Witness IP-addresses based on a Distributed Hash Tabel. It also does the CNAME - stuff that DNS offers for KERI: the mapping between an identifier and it's controller AID stored in the KEL to its current wittness AID and the wittness AID to the IP address. (@henkvancann)

version 1, commit 4b378fb, created 2022-07-30, contributors Henk van Cann

keripy #acdc

The Python programming-language implementation of the KERI protocol.

version 1, commit 76dd32c, created 2022-11-02, contributors Henk van Cann

KERL #acdc

Key event receipt log

version 1, commit 3766e67, created 2022-08-15, contributors Henk van Cann

key #acdc

In our digital scope it's a mechanism for granting or restricting access to something. MAY be used to issue and prove, MAY be used to transfer and control over identity and cryptocurrency. More

version 1, commit af207f4, created 2022-08-02, contributors Henk van Cann

key compromise #acdc

More in the security sections of Universal Identifier Theory

version 3, commit aa1f23f, created 2022-07-30, last modified 2022-09-06, contributors Henk van Cann

key event #acdc

Concretely, the serialized data structure of an entry in the key event log for an AID. Abstractly, the data structure itself. Key events come in different types and are used primarily to establish or change the authoritative set of keypairs and/or anchor other data to the authoritative set of keypairs at the point in the key event log actualized by a particular entry.
Source Sam Smith

version 7, commit df4b4ce, created 2022-07-30, last modified 2022-08-06, contributors Henk van Cann

key event log #acdc

KELs are hash-chained Key Events. These are blockchains in a narrow definition, but not in the sense of ordering (not ordered) or global consensus mechanisms (which is not needed). (SamMSmith)

A KEL is KERI's VDS: the proof of key state of its identifier.

version 1, commit c4f5607, created 2022-08-15, contributors Henk van Cann

key event message #acdc

Message whose body is a key event and whose attachments may include signatures on its body.
Source Sam Smith

version 2, commit 613ec3f, created 2022-07-30, last modified 2022-08-05, contributors Henk van Cann

key event receipt #acdc

Message whose body references a key event and whose attachments MUST include one or more signatures on that key event.
Source Sam Smith

version 2, commit 6fa27f4, created 2022-07-30, last modified 2022-08-05, contributors Henk van Cann

key event receipt infrastructure #acdc

Also KERI. It's a new approach to decentralized identifiers and decentralized key management that promises significant benefits for SSI (self-sovereign identity) and ToIP (Trust over IP) infrastructure.
(@drummondreed)

KERI is an identifier system that fixes the internet. It's a fully decentralized permission-less key management architecture. It solves the secure attribution problem to its identifiers and allows portability.
(@henkvancann)

version 1, commit f51cb9c, created 2022-08-15, contributors Henk van Cann

key event receipt log #acdc

Signed Key Events, keeping track of establishment events. To begin with the inception event and any number of rotation events. We call that the establishment subsequence. The Key Event Receipt Logs are built from receipts of events signed by the witnesses of those events (these are called commitments); these are also append-only but not hash-chained. (@henkvancann)

version 1, commit 06933dc, created 2022-08-15, contributors Henk van Cann

key management #acdc

management of cryptographic keys in a crypto-system. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys (also rotation). It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.

Successful key management is critical to the security of a crypto-system. It is the more challenging side of cryptography in a sense that it involves aspects of social engineering such as system policy, user training, organizational and departmental interactions, and coordination between all of these elements, in contrast to pure mathematical practices that can be automated.

More on wikipedia

version 1, commit 6a4e7dd, created 2022-08-02, contributors Henk van Cann

key pair #acdc

is a private key and its corresponding public key resulting from a one-way crypto-graphical function; a key pair is used with an asymmetric-key (public-key) algorithm in a so called Public Key Infrastructure (PKI).

version 3, commit 06b2e19, created 2022-08-28, last modified 2022-09-07, contributors Henk van Cann

key state #acdc

Includes the set of currently authoritative keypairs for an AID and any other information necessary to secure or establish control authority over an AID.
Source Sam Smith

version 2, commit 88a8cc6, created 2022-07-30, last modified 2022-08-05, contributors Henk van Cann

key stretching #acdc

In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) it takes to test each possible key.

version 1, commit 9ceed8d, created 2022-08-06, contributors Henk van Cann

key transparency #acdc

Key Transparency does this by using piece of blockchain technology called a Merkle Tree.
More on Stackexchange how key transparency works.
(@henkvancann)

version 1, commit a455b72, created 2022-08-02, contributors Henk van Cann

keystore #acdc

A keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs.
Source: Philip Feairheller.

version 5, commit 99e6534, created 2022-08-06, last modified 2022-08-09, contributors Henk van Cann

KID #acdc

KERI improvement doc

version 1, commit e65c63d, created 2022-08-15, contributors Henk van Cann

kli #acdc

KERI command line interface

version 1, commit 3a1e2a3, created 2022-08-15, contributors Henk van Cann

L
lead bytes #acdc

In order to avoid confusion with the use of the term pad character, when pre-padding with bytes that are not replaced later, we use the term lead bytes. So lead-bytes are added "pre-conversion".

version 1, commit e228b58, created 2022-09-30, contributors Henk van Cann

ledger backer #acdc

A witness in KERI that is ledger-registered. It's a type of backer that proof its authenticity by a signing key anchored to the public key of a data item on a (public) blockchain.

version 1, commit 24154a3, created 2022-08-06, contributors Henk van Cann

Unique parties that are legally or financially responsible for the performance of financial transactions or have the legal right in their jurisdiction to enter independently into legal contracts.

version 2, commit 1c425fd, created 2022-08-17, last modified 2022-08-29, contributors Henk van Cann

A document that details the requirements for vLEI Role Credentials issued to representatives of a Legal Entity in other than official roles but in functional or other context of engagement.
Source: Draft vLEI Ecosystem Governance Framework Glossary.

version 2, commit ffe9833, created 2022-08-18, last modified 2022-08-18, contributors Henk van Cann

A document that details the requirements for vLEI Role Credentials issued to official representatives of a Legal Entity.
Source: Draft vLEI Ecosystem Governance Framework Glossary.

version 2, commit 1cb88a9, created 2022-08-18, last modified 2022-08-18, contributors Henk van Cann

A document that details the requirements for vLEI Credential issued by a Qualified vLEI Issuer to a Legal Entity.

version 1, commit da27649, created 2022-08-18, contributors Henk van Cann

LEI #acdc

Legal Entity Identifier

version 1, commit 530ebc0, created 2022-08-17, contributors Henk van Cann

levels of assurance #acdc

KERI has the same LOAs for entropy and trust in human behavior preserving the security of key pairs and preserving their own privacy. It has high LOAs for the cryptographic bindings of controllers and identifiers. Also the validation of witnesses and watchtowers has high a LOA.

version 1, commit 404a75f, created 2022-08-15, contributors Henk van Cann

liveness #acdc

On wikipedia

version 1, commit 14e54b4, created 2022-08-02, contributors Henk van Cann

LoA #acdc

Levels of assurance

version 1, commit c225891, created 2022-08-15, contributors Henk van Cann

LoC #acdc

Loci of control

version 1, commit 4e5d5e2, created 2022-08-15, contributors Henk van Cann

loci of control #acdc

Locus of control is the degree to which people believe that they, as opposed to external forces (beyond their influence), have control over the outcome of events in their lives. Also 'LoC'.
More on wikipedia

version 1, commit 89da845, created 2022-08-15, contributors Henk van Cann

locked state #acdc

The default status a KERI data store is in once it has been created using a passcode; it is by default encrypted.

version 1, commit 3b89d9d, created 2022-08-08, contributors Henk van Cann

M
management TEL #acdc

Management transaction event log

version 1, commit 7e4a3f1, created 2022-08-15, contributors Henk van Cann

management transaction event log #acdc

A 'management TEL' will signal the creation of the Virtual Credential Registry (VCR) and track the list of Registrars that will act as Backers for the individual _ transaction event logs (TELs)_ for each virtual credential (VC).

version 1, commit d2770fc, created 2022-08-15, contributors Henk van Cann

message #acdc

serialized data structure event, an actionable message

version 2, commit 0a11849, created 2022-08-01, last modified 2022-08-05, contributors Henk van Cann

most compact #acdc

An ACDC that, for a given level of disclosure, is as compact as it can be which means

  • it has the SAIDs for each section that are not disclosed
  • it has expanded sections that are disclosed

Multiple forms of a single ACDC can be called the "most compact" version given that each level of graduated disclosure will have a "most compacted" version. If all the blocks are expanded of a most compact version then it becomes fully expanded. If all the blocks are replaced with SAIDs then it becomes fully compacted.

This form is a part of the graduated disclosure objective.

version 6, commit 1c410fb, created 2022-10-11, last modified 2022-10-11, contributors Henk van Cann - Kent Bull

multicodec #acdc

Is a self-describing multi-format, it wraps other formats with a tiny bit of self-description. A multi-codec identifier is both a variant (variable length integer) and the code identifying data.

See more at GitHub Multi-codec

Multi-codec is an agreed-upon codec table. It is designed for use in binary representations, such as keys or identifiers (i.e CID). It is then used as a prefix to identify the data that follows.

version 1, commit 6dccf78, created 2022-08-02, contributors Henk van Cann

multiplexing #acdc

In telecommunications and computer networking, multiplexing (sometimes contracted to muxing) is a method by which multiple analog or digital signals are combined into one signal over a shared medium. The aim is to share a scarce resource - a physical transmission medium.
More on source Wikipedia-page

version 5, commit 1c46727, created 2022-09-29, last modified 2022-09-29, contributors Henk van Cann

multisig #acdc

also multi-signature or multisignature; is a digital signature scheme which allows a group of users to sign a single piece of digital data.
Paraphrased by @henkvancann from Wikipedia source

version 2, commit be7f787, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

N
naive conversion #acdc

Non-CESR Base64 conversion. How people are used to using the Base64 encode and decode. Without pre-padding etc all the stuff CESR does to ensure aligns on 24 bit boundaries so CESR never uses the '=' pad character. But naive Base64 will pad if the length is not 24 bit aligned.
Source: Samuel Smith in issue 34

Naive conversion is a text to binary conversion or vice versa that doesn't anticipate on either composability and / or on the concatenation capability of the result of such an operation.

version 3, commit 6727b18, created 2022-09-30, last modified 2022-10-11, contributors Henk van Cann

namespace #acdc

In an identity system, an identifier can be generalized to a namespace to provide a systematic way of organizing identifiers for related resources and their attributes. A namespace is a grouping of symbols or identifiers for a set of related objects.

A namespace employs some scheme for assigning identifiers to the elements of the namespace. A simple name-spacing scheme uses a prefix or prefixes in a hierarchical fashion to compose identifiers. The following is an example of a namespace scheme for addresses within the USA that uses a hierarchy of prefixes:

state.county.city.zip.street.number.

An example element in this namespace may be identified with the following:

utah.wasatch.heber.84032.main.150S.

version 2, commit 1085510, created 2022-08-02, last modified 2022-08-05, contributors Daniel Hardman - Henk van Cann

nested cooperative delegated identifiers #acdc

More in chapter Nested Delegation Recovery of the whitepaper

version 2, commit 51119c2, created 2022-08-01, last modified 2022-08-01, contributors Henk van Cann

NFT #acdc

Non-fungible token

version 1, commit 3c4d169, created 2022-08-15, contributors Henk van Cann

non establishment event #acdc

Key Event that does not change the current key-state for an AID. Typically the purpose of a non-establishment event is to anchor external data to a given key state as established by the most recent prior establishment event for an AID.
Source Sam Smith

version 1, commit ff6f284, created 2022-08-05, contributors Henk van Cann

non fungible token #acdc

Sometimes an NFT doesn't only uniquely represent a digital asset. It can be the digital twin of - and is also (hopefully) backed by - a real-life asset. Even in this perspective KERI and ACDC are more emcompassing too, because in the KERI/ACDC case we are dealing with globally portable unique digital twins, not anchored to (read locked in) a blockchain.

version 1, commit 651a822, created 2022-08-15, contributors Henk van Cann

non normative #acdc

A theory is called non-normative if it does not do what has described under 'Normative'. In general, the purpose of non-normative theories is not to give answers, but rather to describe possibilities or predict what might happen as a result of certain actions.
Source.

version 1, commit fc566c4, created 2022-08-03, contributors Henk van Cann

non repudiable #acdc

Non-repudiation refers to a situation where a statement's author cannot successfully dispute its authorship or the validity of an associated contract, signature or commitment.
The term is often seen in a legal setting when the authenticity of a signature is being challenged. In such an instance, the authenticity is being "repudiated".

version 1, commit 8428e82, created 2022-08-06, contributors Henk van Cann

non transferable #acdc

No capacity to transfer (the control over) a certain digital asset in an unobstructed or loss-less manner. As opposed to transferable.

For example not legally transferable to the ownership of another entity.

version 6, commit 57687cd, created 2022-08-06, last modified 2022-09-30, contributors Henk van Cann

non transferable identifier #acdc

Controlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other control.
An identifier of this type has specific positive features like short-lived, peer to peer, one-time use, discardable, etc. that are very practical in certain use cases. Moreover non-transferable identifiers are much easier to govern than persistent identifiers that are transferable.

version 2, commit c7a5a89, created 2022-09-20, last modified 2022-09-30, contributors Henk van Cann

normative #acdc

a theory is “normative” if it, in some sense, tells you what you should do - what action you should take. If it includes a usable procedure for determining the optimal action in a given scenario.
Source.

version 1, commit a7665d0, created 2022-08-03, contributors Henk van Cann

O
official organizational role #acdc

Also 'OOR'. A person that represents the Legal Entity in an official organizational role and is issued an OOR vLEI Credential.
Source Draft vLEI Ecosystem Governance Framework Glossary.

version 2, commit 9613053, created 2022-08-17, last modified 2022-08-17, contributors Henk van Cann

one way functions #acdc

In computer science, a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input. Here, "easy" and "hard" are to be understood in the sense of computational complexity theory, specifically the theory of polynomial time problems.
More on Wikipedia

version 1, commit 5de77ee, created 2022-08-03, contributors Henk van Cann

OOBI #acdc

Out-of-band introduction

version 1, commit 3acf1a7, created 2022-08-15, contributors Henk van Cann

OOR #acdc

Official Organizational Role

version 1, commit 6eab2d6, created 2022-08-17, contributors Henk van Cann

out of band introduction #acdc

Out-of-band Introductions (OOBIs) are discovery and validation of IP resources for KERI autonomic identifiers. Discovery via URI, trust via KERI.

The simplest form of a KERI OOBI is a namespaced string, a tuple, a mapping, a structured message, or structured attachment that contains both a KERI AID and a URL. The OOBI associates the URL with the AID. In tuple form this abstractly:

(url, aid)

and concretely

("http://8.8.5.6:8080/oobi", "EaU6JR2nmwyZ-i0d8JZAoTNZH3ULvYAfSVPzhzS6b5CM")

version 2, commit dc05628, created 2022-08-15, last modified 2022-08-23, contributors Henk van Cann

owner #acdc

Owner in ToIP glossary

version 1, commit 2a4a127, created 2022-08-29, contributors Henk van Cann

ownership #acdc

Ownership in ToIP glossary

version 1, commit fdac07f, created 2022-08-29, contributors Henk van Cann

P
P2P #acdc

Peer to peer

version 1, commit 3afb3b7, created 2022-08-15, contributors Henk van Cann

pad #acdc

is a character used to fill empty space, because many applications have fields that must be a particular length.
Source

version 2, commit ca4cbd1, created 2022-09-30, last modified 2022-09-30, contributors Henk van Cann

partial pre rotation #acdc

Partial rotation

version 1, commit 193c674, created 2022-08-23, contributors Henk van Cann

partial rotation #acdc

The pre-rotation mechanism supports partial pre-rotation or more exactly partial rotation of pre-rotated keypairs. It's a rotation operation on a set of pre-rotated keys that may keep some keys in reserve (i.e unexposed) while exposing others as needed.

Partial rotation serves two important purposes:

Paraphrased by @henkvancann on the bases of the IETF-KERI draft 2022 by Samual Smith.

version 3, commit 20ffa1c, created 2022-08-23, last modified 2022-08-23, contributors Henk van Cann

passcode #acdc

A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity.
More on source Wikipedia

version 1, commit a591865, created 2022-08-06, contributors Henk van Cann

payload #acdc

The term 'payload' is used to distinguish between the 'interesting' information in a chunk of data or similar, and the overhead to support it. It is borrowed from transportation, where it refers to the part of the load that 'pays': for example, a tanker truck may carry 20 tons of oil, but the fully loaded vehicle weighs much more than that - there's the vehicle itself, the driver, fuel, the tank, etc. It costs money to move all these, but the customer only cares about (and pays for) the oil, hence, 'pay-load'. Source.

version 1, commit 5cc6766, created 2022-08-06, contributors Henk van Cann

peer to peer #acdc

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer network of nodes

More on source Wikipedia

version 1, commit 91beaa3, created 2022-08-15, contributors Henk van Cann

persistent data structure #acdc

An append only verifiable data structure. What we sign may not change.

version 3, commit 21ceffa, created 2022-09-27, last modified 2022-09-27, contributors Daniel Hardman - Henk van Cann

persistent identifier #acdc

Transferable Identifiers

version 1, commit 8d1e862, created 2022-09-20, contributors Henk van Cann

PGP #acdc

Pretty good privacy

version 1, commit f01ed4e, created 2022-08-15, contributors Henk van Cann

pii #acdc

personally identifiable information

version 1, commit 73aa3e3, created 2022-11-08, contributors Henk van Cann

pipelining #acdc

In computing, a pipeline, also known as a data pipeline, is a set of data processing elements connected in series, where the output of one element is the input of the next one. The elements of a pipeline are often executed in parallel or in time-sliced fashion. Some amount of buffer storage is often inserted between elements.
More on source Wikipedia-page

version 1, commit 5fb5b17, created 2022-09-29, contributors Henk van Cann

PKI #acdc

Public key infrastructure

version 1, commit 1594c3c, created 2022-08-15, contributors Henk van Cann

post pad #acdc

the action and / or result of extending a string with trailing pad characters to align to a certain length in bits or bytes.

version 1, commit fe7f48f, created 2022-09-30, contributors Henk van Cann

pre pad #acdc

the action and / or result of prepending a string with leading pad characters to align to a certain length in bits or bytes.

version 1, commit 86a4ef2, created 2022-09-30, contributors Henk van Cann

pre rotation #acdc

It is a new invention in KERI. Pre-rotation is a cryptographical commitment (a hash) to the next private key in the rotation-scheme.
The pre-rotation scheme provides secure verifiable rotation that mitigates successful exploit of a given set of signing private keys from a set of (public, private) key-pairs when that exploit happens sometime after its creation and its first use to issue a self-certifying identifier. In other words, it assumes that the private keys remains private until after issuance of the associated identifier. Source: chapter Pre-rotation in whitepaper

version 3, commit 36dbf7d, created 2022-07-30, last modified 2022-08-01, contributors Henk van Cann

prefix #acdc

A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key.
Including the derivation code in the prefix binds the derivation process along with the public key to the resultant identifier.

An example of the prefix with a one character derivation code and a 32 byte public key encoded into a 44 character Based-64 string follows: BDKrJxkcR9m5u1xs33F5pxRJP6T7hJEbhpHrUtlDdhh0

Basic Prefix Derivation image

version 8, commit 7ad96e3, created 2022-07-09, last modified 2022-08-10, contributors Henk van Cann

presentation exchange #acdc

An exchange that provides disclosure of one or more ACDCs between a Discloser and a Disclosee.

A presentation exchange is the process by which authenticatable information may be exchanged between two parties, namely, the Discloser and Disclosee.

version 3, commit 448511f, created 2022-09-06, last modified 2022-09-06, contributors Henk van Cann

pretty good privacy #acdc

Is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991.
More on wikipedia
So also the often confusing GPG term.

version 1, commit f46c25b, created 2022-08-15, contributors Henk van Cann

primary root of trust #acdc

In KERI its a root-of-trust that is cryptographically verifiable all the way to its current controlling key pair in a PKI.

version 1, commit 8484f97, created 2022-08-06, contributors Henk van Cann

primitive #acdc

In general in computing a 'primitive' is the simplest type of programming language item. It may also refer to the smallest processing unit accessible by a programmer.
Source

version 3, commit f07ad85, created 2022-08-05, last modified 2022-09-29, contributors Henk van Cann

promiscuous mode #acdc

It is the mode a watcher runs in. A watcher uses the same code as a witness. However a watcher does so "lacking standards of selection; acting without careful judgment; indiscriminate". Or "Showing little forethought or critical judgment; casual."
Source

version 1, commit f3187d6, created 2022-09-06, contributors Henk van Cann

proof of authority #acdc

Proof that somebody or something has certain rights or permissions. It's about data. Whereas proof of authorship is about data and its original creator.
A proof-of-authority provides verifiable authorizations or permissions or rights or credentials.

version 6, commit 546092d, created 2022-07-09, last modified 2022-07-09, contributors Henk van Cann

proof of authorship #acdc

Proof that somebody or something has originally created certain content. It's about data's inception. Whereas proof-of-authority is about rights attached to this data.

For example, a signature constitutes direct proof of authorship; less directly, handwriting analysis may be submitted as proof of authorship of a document.[21] Privileged information in a document can serve as proof that the document's author had access to that information; such access might in turn establish the location of the author at certain time, which might then provide the author with an alibi.
Source

version 10, commit 0f3c698, created 2022-07-09, last modified 2022-10-19, contributors Henk van Cann

protocol #acdc

Generic term to describe a code of correct conduct. Also called "etiquette": a code of personal behavior.

version 1, commit a34c704, created 2022-09-06, contributors Henk van Cann

pseudo random number #acdc

A (set of) value(s) or element(s) that is statistically random, but it is derived from a known starting point and is typically repeated over and over. Pseudo-random numbers provide necessary values for processes that require randomness, such as creating test signals or for synchronizing sending and receiving devices in a spread spectrum transmission.

It is called "pseudo" random, because the algorithm can repeat the sequence, and the numbers are thus not entirely random.
Source

version 2, commit 6ae8298, created 2022-09-22, last modified 2022-09-22, contributors Henk van Cann

PTEL #acdc

Public transaction event log

version 1, commit 5f19c7b, created 2022-08-15, contributors Henk van Cann

public key infrastructure #acdc

Is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.

Public Private Key caveat to KERI

More on Wikipedia

version 1, commit 457583b, created 2022-08-15, contributors Henk van Cann

public transaction event log #acdc

The KEL is used to establish control authority over the keys used to commit to the events of the TEL and sign the VC. The events of the TEL are used to establish the issuance or revocation state of the VCs issued by the controller of the identifier represented by the KEL.

Source: pfeairheller

version 4, commit 63d4624, created 2022-08-15, last modified 2022-10-10, contributors Henk van Cann

public verifiable credential registry #acdc

is a form of a Verifiable Data Registry that tracks the issuance/revocation state of credentials issued by the controller of the KEL.

Two types of TELs will be used for this purpose. The first type of TEL is the management TEL and will signal the creation of the Registry and track the list of Registrars that will act as Backers for the individual TELs for each VC. The second type of TEL is the VC TEL which will track the issued or revoked state of each VC and will contain a reference to it's corresponding management TEL.

version 2, commit b229feb, created 2022-08-15, last modified 2022-08-29, contributors Henk van Cann

Q
QAR #acdc

QVI Authorized Representative

version 1, commit d6d6acd, created 2022-08-17, contributors Henk van Cann

qualified #acdc

When qualified, a cryptographic primitive includes a prepended derivation code (as a proem) that indicates the cryptographic algorithm or suite used for that derivation. This simplifies and compactifies the essential information needed to use that cryptographic primitive. All cryptographic primitives expressed in either text or binary CESR are qualified by definition [CESR-ID]. Qualification is an essential property of CESR [CESR-ID].
Sam Smith, IETF-keri

version 2, commit e4a10ba, created 2022-07-30, last modified 2022-08-05, contributors Henk van Cann

qualified vlei issuer #acdc

The contracting party to the vLEI Issuer Qualification Agreement that has been qualified by GLEIF as a Qualified vLEI Issuer.
Source: Draft vLEI Ecosystem Governance Framework Glossary.

version 3, commit 2a5eaa2, created 2022-08-16, last modified 2022-08-17, contributors Henk van Cann

qualified vlei issuer vlei credential governance framework #acdc

A document that details the requirements to enable this Credential to be issued by GLEIF to Qualified vLEI Issuers which allows the Qualified vLEI Issuers to issue, verify and revoke Legal Entity vLEI Credentials, Legal Entity Official Organizational Role vLEI Credentials, and Legal Entity Engagement Context Role vLEI Credentials.

version 3, commit 54c6081, created 2022-08-18, last modified 2022-08-18, contributors Henk van Cann

QVI #acdc

Qualified vLEI issuer

version 1, commit b2b5c16, created 2022-08-16, contributors Henk van Cann

R
race condition #acdc

A race condition or race hazard is the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of other uncontrollable events. It becomes a bug when one or more of the possible behaviors is undesirable.
Source.

version 1, commit c5711bc, created 2022-08-06, contributors Henk van Cann

receipt #acdc

event message or reference with one or more witness signatures

version 1, commit a2e1d10, created 2022-08-01, contributors Henk van Cann

receipt log #acdc

ordered record of all key event receipts for a given set of witnesses

version 1, commit 9030e41, created 2022-08-01, contributors Henk van Cann

redundant credential #acdc

Multiple credentials issued by the same issuer (e.g. a QVI). They do not have anything to do with each other. They are independently valid.

version 3, commit 71b51d5, created 2022-08-16, last modified 2022-08-16, contributors Henk van Cann

registrar #acdc

identifiers that serve as backers for each transaction event log (TEL) under its provenance. This list of Registrars can be rotated with events specific to a certain type of TEL. In this way, a Registrar is analogous to a Backer in KERI KELs and Registrar lists are analogous to Backer lists in KERI KELs.

version 2, commit 7a1b1f5, created 2022-08-02, last modified 2022-10-19, contributors Henk van Cann

registry #acdc

In our digital mental model it's an official digital record book. When people refer to a registry, they usually mean a specific instance, within a multi-tenant registry. E.g. Docker Hub is a multi-tenant registry, where there’s a set of official / public images.

version 4, commit 1954cd9, created 2022-09-28, last modified 2022-10-19, contributors Henk van Cann

replay attack #acdc

A replay attack occurs when a cybercriminal eavesdrops on a secure network communication, intercepts it, and then fraudulently delays or resends it to misdirect the receiver into doing what the hacker wants. The added danger of replay attacks is that a hacker doesn't even need advanced skills to decrypt a message after capturing it from the network. The attack could be successful simply by resending the whole thing.
More on how it works and stopping replay attacks at source

version 1, commit 91e3e5b, created 2022-10-19, contributors Henk van Cann

repo #acdc

Software is our line of work. In this, 'repo' is the short hand for 'Repository', mostly referring to a software repo(sitory) on Github.com, Gitlab (https://gitlab.com) or other software repository hosting services.

version 1, commit 7f42761, created 2022-08-05, contributors Henk van Cann

reserve rotation #acdc

One important use case for partial rotation is to enable pre-rotated key pairs designated in one establishment event to be held in reserve and not exposed at the next (immediately subsequent) establishment event.
Source IETF-KERI draft 2022 by Samual Smith.

version 2, commit a56b781, created 2022-08-23, last modified 2022-08-23, contributors Henk van Cann

revocation event #acdc

Revocation is the act of recall or annulment. It is the cancelling of an act, the recalling of a grant or privilege, or the making void of some deed previously existing.
More on source Wikipedia

version 4, commit 72ae766, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

ricardian contract #acdc

The Ricardian contract, as invented by Ian Grigg in 1996, is a method of recording a document as a contract at law, and linking it securely to other systems, such as accounting, for the contract as an issuance of value.
It is robust through use of identification by cryptographic hash function, transparent through use of readable text for legal prose and efficient through markup language to extract essential information.
More at source Wikipedia

version 1, commit 7461df1, created 2022-09-06, contributors Henk van Cann

rotation #acdc

The operation of revoking and replacing the set of authoritative key pairs for an AID. This operation is made verifiable and duplicity evident upon acceptance as a rotation event that is appended to the AID's KEL.
Source Sam Smith

version 2, commit 4b7f6cb, created 2022-08-05, last modified 2022-10-19, contributors Henk van Cann

rotation authority #acdc

The (exclusive) right to rotate the authoritative key pair and establish changed control authority.

version 1, commit 87cd501, created 2022-08-23, contributors Henk van Cann

rotation event #acdc

A type of establishment event that provides the information needed to change the key-state which includes a change to the set of authoritative keypairs for an AID.
Source Sam Smith

version 5, commit 9561c40, created 2022-08-05, last modified 2022-08-23, contributors Henk van Cann

RUN #acdc

The acronym for the new peer-to-peer end-verifiable monotonic update policy is RUN (Read, Update, Nullify).

RUN as opposed to CRUD which is the traditional client-server database update policy.

version 2, commit e1fc385, created 2022-10-17, last modified 2022-10-19, contributors Henk van Cann

run off the crud #acdc

Run off the CRUD means the source of truth for each data item is a decentralized controller Peer, a given database hosted by any Peer does not create records in the traditional sense of a server creating records for a client.

version 2, commit 0be9647, created 2022-10-19, last modified 2022-10-19, contributors Henk van Cann

S
SAD #acdc

Self addressing data

version 1, commit ee81997, created 2022-08-15, contributors Henk van Cann

SAID #acdc

Self-addressing identifier

version 1, commit 852fcee, created 2022-08-15, contributors Henk van Cann

sally #acdc

is an implementation of a verification service and acting as a reporting server. It is purpose-built software for the vLEI ecosystem to allow participants in the vLEI ecosystem present credentials, so the GLEIF Reporting API can show what vLEIs are; issued to Legal Entities.

version 2, commit 6fd0308, created 2022-10-04, last modified 2022-10-10, contributors Henk van Cann

salt #acdc

Wikipedia

version 1, commit 849db8d, created 2022-08-02, contributors Henk van Cann

SATP #acdc

Secure asset transfer protocol

version 1, commit 403e28c, created 2022-08-15, contributors Henk van Cann

schema namespace registry #acdc

a centrally managed schema registry where corporations or individuals reserve schemas within a specific namespace in order to have an interoperable schema that is labeled with a corporation-specific or individual-specific namespace.

version 1, commit 05e5088, created 2022-09-28, contributors Henk van Cann

schema registry #acdc

Central registry for credential schemas based on namespaces.

version 6, commit 61594c0, created 2022-09-28, last modified 2022-09-28, contributors Henk van Cann

SCID #acdc

Self-certifying identifier

version 1, commit ae01af4, created 2022-08-15, contributors Henk van Cann

seal #acdc

A seal is a cryptographic proof in a secondary root-of-trust (e.g. TEL) that is anchored in a primary-root-of-trust (e.g.KEL).

version 2, commit 85eab1f, created 2022-08-15, last modified 2022-08-15, contributors Henk van Cann

secondary root of trust #acdc

In KERI its a root-of-trust that, for its secure attribution, depends on another verifiable data structure (VDS) which MUST be a primary root-of-trust.
By its nature and cryptographic anchoring via seals to a primary root-of-trust, a secondary root-of-trust still has a high level of trustability and can be automatically verified.

version 2, commit 4c4d8fd, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

secure asset transfer protocol #acdc

KERI has portable identifiers per definition. KERI identifier are not locked into silos like distributed ledgers. KERI IDs have their own native hash-chained data structures (KEL, KERL and TEL).

version 1, commit e438dc8, created 2022-08-15, contributors Henk van Cann

secure attribution #acdc

In short: secure attribution is "whodunit?!" in cyberspace.

Secure attribution is strongly related to making and proving statements. A controller makes statements to the a validator or verifier, who in turn validates the statements issued. A controller "owns" the statement: content and attribution via digital signatures.
Secure attribution of a statement is a way of proving that the statement is an authentic statement of the controller. In the context of KERI and ACDC secure means a Validator may cryptographically verify the statement.

version 1, commit 379e7e9, created 2022-07-09, contributors Henk van Cann

seed #acdc

In cryptography a 'seed' is a pseudorandomly generated number, often expressed in representation of a series of words.
Paraphrased from wikipedia

version 1, commit 79fe851, created 2022-08-05, contributors Henk van Cann

self addressing data #acdc

While all KERI event messages are self-addressing data (SAD), there is a broad class of SADs that are not KERI events but that require signature attachments. ACDC Verifiable credentials fit into this class of SADs. With more complex data structures represented as SADs, such as verifiable credentials, there is a need to provide signature attachments on nested subsets of SADs.
(Philip Feairheller, ietf-cesr-proof)

version 1, commit 4f16a58, created 2022-08-15, contributors Henk van Cann

self addressing identifier #acdc

A terse way to describe a SAID and its data is to write an expression that consists of the token SAID followed by a token with field names in canonical order, where the field containing the SAID itsef is marked by the suffix =said. For example, the saidification of a simple ContactInfo data structure might be given as SAID(name, address, phone, email, id=said).

version 1, commit 858e6c6, created 2022-08-15, contributors Henk van Cann

self certifying identifier #acdc

A Self-Certifying Identifier (SCID) cryptographically binds an identifier to a public and private key pair. It is an identifier that can be proven to be the one and only identifier tied to a public key using cryptography alone.

version 1, commit f324bfb, created 2022-08-15, contributors Henk van Cann

self framing #acdc

a textual encoding that includes type, size, and value is self-framing.
Source Samual M Smith

version 1, commit 1826a6f, created 2022-08-14, contributors Henk van Cann

self sovereign identity #acdc

Self-Sovereign Identity (SSI) is a term that has many different interpretations, and that we use to refer to concepts/ideas, architectures, processes and technologies that aim to support (autonomous) parties as they negotiate and execute electronic transactions with one another.
Paraphrased by @henkvancann, sources eSSIF-lab and ToIP.

version 3, commit f98cdde, created 2022-08-15, last modified 2022-08-29, contributors Henk van Cann

self sovereignty #acdc

Self sovereignty in Trust over IP wiki.

version 1, commit 28a9025, created 2022-08-29, contributors Henk van Cann

server sent event #acdc

Mailbox notifications; a streaming service for the agent U/I, to get notifications from the KERI system itself.

version 1, commit bd4e018, created 2022-08-08, contributors Henk van Cann

service endpoint #acdc

In our context we consider a web service endpoint which is a URL at which clients of specific service can get access to the service.

version 4, commit 9d41054, created 2022-08-07, last modified 2022-08-07, contributors Henk van Cann

signed digest #acdc

commitment to content, by digitally signing a digest of this content.

version 1, commit 9e316a3, created 2022-08-01, contributors Henk van Cann

signify #acdc

Signify is a web client (key) event signing - and key pair creation app that minimizes the use of KERI on the client.

The main reason is that we want to minimize what needs to be put in the client or the cloud. Most proofs should be cryptographically verifiable and it should not be able to be repudiated (successful pointing fingers should be prevented), and this happens when the signatures come straight from the controller.

version 4, commit aeff9fe, created 2022-10-04, last modified 2022-10-04, contributors Henk van Cann

signing authority #acdc

The authority to sign on behalf of the controller of the authoritative key pair. Often in situation where delegation has taken place, e.g. a custodial agent. These are limited rights because rotation authority is not included.

version 2, commit 1966974, created 2022-08-23, last modified 2022-08-23, contributors Henk van Cann

signing threshold #acdc

Is the minimum number of valid signatures to satisfy the requirement for successful verification in a Threshold Signature Scheme.

version 3, commit 4fc7803, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

single signature identifier #acdc

or single sig identifier; is an identifier controlled by a one-of-one signing keypair

version 1, commit 778b844, created 2022-08-06, contributors Henk van Cann

solicited issuance #acdc

The issuance of a Legal Entity vLEI Credentials, OOR vLEI Credentials and ECR vLEI Credentials upon receipt by the QAR of a Fully Signed issuance request from the AVR(s) of the Legal Entity.
Source: Draft vLEI Ecosystem Governance Framework Glossary.

version 3, commit f5b5983, created 2022-08-17, last modified 2022-08-17, contributors Henk van Cann

source of truth #acdc

The source of truth is a trusted data source that gives a complete picture of the data object as a whole.
Source: LinkedIN.

version 1, commit d77b899, created 2022-08-26, contributors Henk van Cann

spanning layer #acdc

An all encompassing layer horizontal layer in a software architecture. Each trust layer only spans platform specific applications. It bifurcates the internet trust map into domain silos (e.g. twitter.com), because there is no spanning trust layer.

version 2, commit ad6ccf6, created 2022-08-02, last modified 2022-08-02, contributors Henk van Cann

SSI #acdc

Self-sovereign identity

version 1, commit 3526bb4, created 2022-08-15, contributors Henk van Cann

ssi system #acdc

The SSI Infrastructure consists of the technological components that are deployed all over the world for the purpose of providing, requesting and obtaining data for the purpose of negotiating and/or executing electronic transactions. Paraphrased by @henkvancann based on source eSSIF-lab

version 1, commit 8c0218d, created 2022-08-07, contributors Henk van Cann

sub shell #acdc

A subshell is basically a new shell just to run a desired program. A subshell can access the global variables set by the 'parent shell' but not the local variables. Any changes made by a subshell to a global variable is not passed to the parent shell.
Source

version 1, commit 8bb06c9, created 2022-08-05, contributors Henk van Cann

T
TCP #acdc

Transmission control protocol

version 1, commit 5750999, created 2022-08-15, contributors Henk van Cann

tcp endpoint #acdc

This is a service endpoint of the web transmission control protocol

version 1, commit 87e4f00, created 2022-08-07, contributors Henk van Cann

TEL #acdc

Transaction event log

version 1, commit 98365f6, created 2022-08-15, contributors Henk van Cann

text binary concatenation composability #acdc

An encoding has composability when any set of self-framing concatenated primitives expressed in either the text domain or binary domain may be converted as a group to the other domain and back again without loss.

version 4, commit 4b0ed21, created 2022-07-31, last modified 2022-09-29, contributors Henk van Cann

threshold signature scheme #acdc

or TSS; is a type of digital signature protocol used by Mutli-party Computation (MPC) wallets to authorize transactions or key state changes.
Source Cryptoapis

version 2, commit df2fcda, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

top level section #acdc

The fields of an ACDC in compact variant. The value of a top level section field is either the SAD or the SAID of the SAD of the associated section. An Issuer commitment via a signature to any variant of ACDC (compact, full, etc) makes a cryptographic commitment to the top-level section fields shared by all variants of that ACDC.
Paraphrased by @henkvancann based on source.

version 3, commit 0d47122, created 2022-09-06, last modified 2022-09-06, contributors Henk van Cann

trans contextual value #acdc

Value that is transferrable between contexts

version 2, commit 394f531, created 2022-08-26, last modified 2022-08-26, contributors Henk van Cann

transaction event log #acdc

An externally anchored transactions log via cryptographic commitments in a KEL.

version 3, commit c3b8244, created 2022-08-15, last modified 2022-10-05, contributors Henk van Cann

transfer off ledger #acdc

The act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure Key Event Log.

version 1, commit 38f874d, created 2022-08-07, contributors Henk van Cann

transferable #acdc

Capable of being transferred or conveyed from one place or person to another. Place can be its and bits. The adjective transferable also means 'Negotiable', as a note, bill of exchange, or other evidence of property, that may be conveyed from one person to another by indorsement or other writing; capable of being transferred with no loss of value. As opposed to non-transferable.
Source

version 3, commit 44509a0, created 2022-09-30, last modified 2022-09-30, contributors Henk van Cann

transferable identifier #acdc

Control over the identifier can be transferred by rotating keys.
A synonym is 'persistent identifier'.

{TBW prio 1}

version 5, commit f89a9b3, created 2022-08-06, last modified 2022-09-30, contributors Henk van Cann

transmission control protocol #acdc

One of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP).
More on source Wikipedia.

version 3, commit 0fb1fbd, created 2022-08-15, last modified 2022-10-05, contributors Henk van Cann

trust domain #acdc

A trust domain is the ecosystem of interactions that rely on a trust basis. A trust basis binds controllers, identifiers, and key-pairs. For example the Facebook ecosystem of social interactions is a trust domain that relies on Facebook’s identity system of usernames and passwords as its trust basis.
(Source whitepaper)

version 3, commit b3e31af, created 2022-08-06, last modified 2022-09-28, contributors Henk van Cann

U
UI #acdc

User interface

version 1, commit 7b6ab95, created 2022-08-15, contributors Henk van Cann

uniform resource locator #acdc

A Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

version 1, commit 1789a2d, created 2022-08-15, contributors Henk van Cann

unsolicited issuance #acdc

Issuance of a Legal Entity vLEI Credential upon notice by a QAR to the AVR(s) of the Legal Entity that a Legal Entity vLEI Credential has been solicited on the Legal Entity’s behalf.
Source: Draft vLEI Ecosystem Governance Framework Glossary.

version 2, commit 2f831b1, created 2022-08-17, last modified 2022-08-17, contributors Henk van Cann

URL #acdc

Uniform resource locator

version 1, commit 1f236a4, created 2022-08-15, contributors Henk van Cann

user interface #acdc

A user interface (UI or U/I) is the space where interactions between humans and machines occur.

version 1, commit 49a259e, created 2022-08-15, contributors Henk van Cann

V
validate #acdc

ESSIF-lab definition of validate. Although this definition is very general, in the KERI/ACDC vocabulary 'validate' currently has extra diverse meanings extending the one of eSSIF-lab, such as

In contrast, validator and verifier have been clearly outlined in the WebofTrust vocabulary.

version 4, commit 5148231, created 2022-09-21, last modified 2022-10-26, contributors Henk van Cann

validator #acdc

determines current authoritative key set for identifier from at least one key event (receipt) log. Types:

  • Validator of any verifiable data structure
  • Validator as a node in distributed consensus or participant

Validator and verifier are close to synonyms for our purposes.

A validator in KERI and ACDC is anybody that wants to establish control-authority over an identifier, created by the controller of the identifier. Validators verify the log, they apply duplicity detection or they leverage somebody else's duplicity detection or apply any other logic so they can say "Yes, these are events I can trust".

version 7, commit 38245ef, created 2022-07-09, last modified 2022-09-30, contributors Henk van Cann

VC #acdc

Verifiable credential

version 1, commit 1591a56, created 2022-08-15, contributors Henk van Cann

VC TEL #acdc

Virtual credential transaction event log

version 1, commit 5765bf6, created 2022-08-15, contributors Henk van Cann

VDS #acdc

Verifiable data structure

version 1, commit 22ffcef, created 2022-08-15, contributors Henk van Cann

veracity #acdc

The quality of being true; contrast authenticity. When a newspaper publishes a story about an event, every faithful reproduction of that story may be authentic — but that does not mean the story was true (has veracity).

version 2, commit ce29fc8, created 2021-08-02, last modified 2021-08-02, contributors Daniel Hardman

verifiable #acdc

able to cryptographically verify a certain data structure on its consistency and its authenticity

version 5, commit d5d2a81, created 2022-07-30, last modified 2022-09-30, contributors Henk van Cann

verifiable credential #acdc

here

version 2, commit f5e5a3c, created 2022-08-15, last modified 2022-08-26, contributors Henk van Cann

verifiable data structure #acdc

Provides proof of key state for its identifier. In KERI it is the Key Event Log (KEL). Key management is embedded in KELs, including recovery from key compromise.

version 1, commit 79f49b0, created 2022-08-15, contributors Henk van Cann

Here at Rapidlei.

version 1, commit aff66ac, created 2022-08-15, contributors Henk van Cann

verified integrity #acdc

A mechanism that can unambiguously assess whether the information is/continues to be whole, sound and unimpaired

version 1, commit a0993d1, created 2022-10-26, contributors Henk van Cann

verifier #acdc

the entity that (cryptographically) verifies data received from peers (check structure, signatures, dates). More narrowly defined for the KERI suite: cryptographically verifies signature(s) on an event message.

Notice the subtile difference between validator and verifier.

version 6, commit cccc134, created 2022-07-09, last modified 2022-09-30, contributors Henk van Cann

verify #acdc

Verify in eSSIF-lab glossary

version 1, commit da6802d, created 2022-09-22, contributors Henk van Cann

verify signature #acdc

Applying an algorithm that, given the message, public key and signature, either accepts or rejects the message's claim to authenticity.

Private key signing

version 4, commit d626167, created 2022-08-06, last modified 2022-09-21, contributors Henk van Cann

virtual credential transaction event log #acdc

will track the issued or revoked state of each virtual credential (VC) and will contain a reference to its corresponding management transaction event log (management TEL).

version 1, commit 10426b1, created 2022-08-15, contributors Henk van Cann

vLEI #acdc

Verifiable legal entity identifier

version 1, commit e936b62, created 2022-08-15, contributors Henk van Cann

vlei credential #acdc

Credential concerning a verifiable Legal Entity Identifier, residing in the GLEIS and compliant with one or more of the GLEIF Governance Frameworks

version 2, commit a68b163, created 2022-08-18, last modified 2022-08-18, contributors Henk van Cann

vlei ecosystem governance framework #acdc

The Verifiable LEI (vLEI) Ecosystem Governance Framework Information Trust Policies. It's a document that defines the information security, privacy, availability, confidentiality and processing integrity policies that apply to all vLEI Ecosystem Members.
Paraphrased by @henkvancann from source Draft vLEI Ecosystem Governance Framework Glossary.

version 2, commit 1f74e6e, created 2022-08-17, last modified 2022-08-18, contributors Henk van Cann

vlei role credential #acdc

A vLEI credential that attests a role.

{TBW prio 3}

version 1, commit e1968db, created 2022-08-18, contributors Henk van Cann

W
wallet #acdc

A crypto wallet is a device, physical medium, program or a service which stores the public and/or private keys for cryptocurrency transactions and digital identifiers.
Paraphrased by @henkvancann from source Wikipedia

version 9, commit 949f72f, created 2022-08-06, last modified 2022-08-09, contributors Henk van Cann

watcher #acdc

KERI alternative to total global ordering and consensus protocols is a mechanism called duplicity detection. In the verification and validation watchers are all that matter; they guarantee that logs are immutable by one very simple rule: "first seen wins".

version 3, commit 26aae93, created 2022-08-06, last modified 2022-08-06, contributors Henk van Cann

web of trust #acdc

In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner.
Its decentralized trust model is an alternative to the centralized trust model of a public key infrastructure (PKI), which relies exclusively on a certificate authority (or a hierarchy of such). As with computer networks, there are many independent webs of trust, and any user (through their identity certificate) can be a part of, and a link between, multiple webs. The web of trust concept was first put forth by PGP creator Phil Zimmermann in 1992 in the manual for PGP.

Web of trust illustration

More on Wikipedia

version 2, commit 5ea04b2, created 2022-08-06, last modified 2022-08-10, contributors Henk van Cann

well known witnesses #acdc

Don't use the creation of well-known witnesses in a production environment, but for running tests it's suitable.

version 1, commit f51489a, created 2022-08-02, contributors Henk van Cann

witness #acdc

In KERI and ACDC context, a witness is an entity or component designated (trusted) by the controller of an identifier. The primary role of a witness is to verify, sign, and keep events associated with an identifier. A witness is the controller of its own self-referential identifier which may or may not be the same as the identifier to which it is a witness.\

An identifier witness therefore is part of its trust basis and may be controlled (but not necessarily so) by its controller. The purpose of a pool of witnesses is to protect the controller from external exploit of its identifier.
The term Backer and Witness are closely related in KERI but not synonyms or interchangeable.

version 2, commit 0b2bb03, created 2022-08-01, last modified 2022-08-06, contributors Henk van Cann

X
XBRL #acdc

eXtensible Business Reporting Language

version 5, commit b6bf002, created 2022-10-18, last modified 2022-10-18, contributors Henk van Cann

Z
zero trust #acdc

a Zero Trust approach trusts no one.

version 1, commit 0239063, created 2022-08-06, contributors Henk van Cann