Why is this site necessary? To be understood, takes that we (the KERI / ACDC team) try to understand you. Who? For all those who are not programmers, nor cryptography experts, nor can read code. For those interested in why this technology could be a break-through, and has the ability to change (our view on) our digital presence, digital rights and digital autonomy. Discover your true digital twin. How? Through language, concepts, terminology and glossaries. And offer the meaning and the criteria why terms include or exclude certain other terms. Think of Issuer, Controller, Validator, Verifier, Proof, Root-of-trust, etc. and more in general Self-Sovereign Identity (SSI), Autonomic Identifiers (AID), KERI
, OOBI
, CESR
, and ACDC
.
by Henk van Cann
Posted on July 15, 2022
Definition In brief, an ACDC or ADC proves digital data consistency and authenticity in one go. An ACDC cryptographically secures commitment to data contained, and its identifiers are self-addressing, which means they point to themselves and are also contained ìn the data. Read Moreby Henk van Cann
Posted on July 15, 2022
Definition In brief, an ACDC or ADC proves digital data consistency and authenticity in one go. An ACDC cryptographically secures commitment to data contained, and its identifiers are self-addressing, which means they point to themselves and are also contained ìn the data. Read Moreby Henk van Cann
Posted on July 15, 2022
Definition A mechanism for conveying data that allows the authenticity of its content to be proved. Instance A Verifiable Credential is an ADC. Read Moreby Henk van Cann
Posted on July 15, 2022
Definition Interlinked presentations of evidence that allow data to be tracked back to its origin in an objectively verifiable way. Read Moreby Henk van Cann
Posted on July 15, 2022
Definition The quality of having an objectively verifiable origin; contrast veracity. When a newspaper publishes a story about an event, every faithful reproduction of that story may be authentic — but that does not mean the story was true (has veracity). Read Moreby Daniel Hardman
Posted on July 15, 2022
Definition An identifier that is self-certifying and self-sovereign. Read Moreby Henk van Cann
Posted on July 15, 2022
Definition From Wikipedia (Source): Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. Of particular importance in criminal cases, the concept is also applied in civil litigation... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition This compact encoding scheme fully supports both textual and binary streaming applications of attached crypto material of all types. This approach includes composability in both the textual and binary streaming domains. The primitives may be the minimum possible but still composable size. Making composability a guaranteed property allows future... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition The entity that has the ability to make changes to an identity, cryptocurrency or verifiable credential. The controller of an autonomous identifier is the entity (person, organization, or autonomous software) that has the capability, as defined by derivation, to make changes to an Event Log. This capability is typically... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition Evidence of authority, status, rights, entitlement to privileges, or the like. (source) Read Moreby Henk van Cann
Posted on July 15, 2022
verifiable cryptographic commitment From Wikipedia (Source): A digest is a cryptographic hash function (CHF) is a mathematical algorithm that maps data of an arbitrary size (often called the “message”) to a bit array of a fixed size (the “hash value”, “hash”, or “message digest”). It is a one-way function, that... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authentication), and that the message was not... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition From Wikipedia (source): In mathematics, particularly graph theory, and computer science, a directed acyclic graph (DAG /ˈdæɡ/ (listen)) is a directed graph with no directed cycles. That is, it consists of vertices and edges (also called arcs), with each edge directed from one vertex to another. Why a directed... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign. This type of signature has the same legal standing as a handwritten signature as long as it adheres to... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition A new approach to decentralized identifiers and decentralized key management that promises significant benefits for SSI (self-sovereign identity) and ToIP (Trust over IP) infrastructure. (@drummondreed) KERI is an identifier system that fixes the internet. It’s a fully decentralized permission-less key management architecture. It solves the secure attribution problem to... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition Out-of-band Introductions are discovery and validation of IP resources for KERI autonomic identifiers. Discovery via URI, trust via KERI. The simplest form of a KERI OOBI is a namespaced string, a tuple, a mapping, a structured message, or structured attachment that contains both a KERI AID and a URL.... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key. Including the derivation code in the prefix binds the derivation process along with the public key to the resultant identifier. An example of the prefix... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition Proof that somebody or something has certain rights or permissions. It’s about data. Whereas proof of authorship is about data and its original creator. A proof-of-authority provides verifiable authorizations or permissions or rights or credentials. ACDC and proofs Proof of authorship and proof of authority are integrated in Authentic... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition Proof that somebody or something has originally created certain content. It’s about data. Whereas proof-of-authority is about rights. For example, a signature constitutes direct proof of authorship; less directly, handwriting analysis may be submitted as proof of authorship of a document.[21] Privileged information in a document can serve as... Read Moreby Henk van Cann
Posted on July 15, 2022
Defintion From Wikipedia (Source): Provenance (from the French provenir, ‘to come from/forth’) is the chronology of the ownership, custody or location of a historical object.[1] The term was originally mostly used in relation to works of art but is now used in similar senses in a wide range of fields,... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition In short: secure attribution is “whodunit?!” in cyberspace. Secure attribution is strongly related to making and proving statements. A controller makes statements to the a validator or verifier, who in turn validates the statements issued. A controller “owns” the statement: content and attribution via digital signatures. Secure attribution of... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition An identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evident. To generate a SAID Fully populate the data that the SAID will identify, leaving a placeholder for the value of the SAID itself. Canonicalize the data, if needed.... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition A Self-Certifying Identifier cryptographically binds an identifier to a public and private key pair. It is an identifier that can be proven to be the one and only identifier tied to a public key using cryptography alone. Signing A controller issues an own Identifier by binding a generated public... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition Validator of any verifiable data structure Validator as a node in distributed consensus or participant Validator and verifier are synonyms for our purposes. A validator in KERI and ACDC is anybody that wants to establish control-authority over an identifier, created by the controller of the identifier. Validators verify the... Read Moreby Henk van Cann
Posted on July 15, 2022
Definition The quality of being true; contrast authenticity. When a newspaper publishes a story about an event, every faithful reproduction of that story may be authentic — but that does not mean the story was true (has veracity). Read Moreby Henk van Cann
Posted on July 15, 2022
See validator, we consider validator and verifier being synonyms. Read MoreText can be bold, italic, or strikethrough.
There should be whitespace between paragraphs.
There should be whitespace between paragraphs. We recommend including a README, or a file with information about your project.
This is a normal paragraph following a header. GitHub is a code hosting platform for version control and collaboration. It lets you and others work together on projects from anywhere.
This is a blockquote following a header.
When something is important enough, you do it even if the odds are not in your favor.
// Javascript code with syntax highlighting.
var fun = function lang(l) {
dateformat.i18n = require('./lang/' + l)
return true;
}
# Ruby code with syntax highlighting
GitHubPages::Dependencies.gems.each do |gem, version|
s.add_dependency(gem, "= #{version}")
end
head1 | head two | three |
---|---|---|
ok | good swedish fish | nice |
out of stock | good and plenty | nice |
ok | good oreos |
hmm |
ok | good zoute drop |
yumm |
Long, single-line code blocks should not wrap. They should horizontally scroll if they are too long. This line should be long enough to demonstrate this.
The final element.