Authentic Chained Data Container (ACDC) - Concept, terminology and glossary

Why is this site necessary? To be understood, takes that we (the KERI / ACDC team) try to understand you. Who? For all those who are not programmers, nor cryptography experts, nor can read code. For those interested in why this technology could be a break-through, and has the ability to change (our view on) our digital presence, digital rights and digital autonomy. Discover your true digital twin. How? Through language, concepts, terminology and glossaries. And offer the meaning and the criteria why terms include or exclude certain other terms. Think of Issuer, Controller, Validator, Verifier, Proof, Root-of-trust, etc. and more in general Self-Sovereign Identity (SSI), Autonomic Identifiers (AID), KERI, OOBI, CESR, and ACDC.

Authentic Chained Data Container (ACDC)

by Henk van Cann

Posted on July 15, 2022

Definition In brief, an ACDC or ADC proves digital data consistency and authenticity in one go. An ACDC cryptographically secures commitment to data contained, and its identifiers are self-addressing, which means they point to themselves and are also contained ìn the data. Read More

Authentic Chained Data Container (ACDC)

by Henk van Cann

Posted on July 15, 2022

Definition In brief, an ACDC or ADC proves digital data consistency and authenticity in one go. An ACDC cryptographically secures commitment to data contained, and its identifiers are self-addressing, which means they point to themselves and are also contained ìn the data. Read More

Authentic Data Container (ADC)

by Henk van Cann

Posted on July 15, 2022

Definition A mechanism for conveying data that allows the authenticity of its content to be proved. Instance A Verifiable Credential is an ADC. Read More

Authentic Provenance Chain (APC)

by Henk van Cann

Posted on July 15, 2022

Definition Interlinked presentations of evidence that allow data to be tracked back to its origin in an objectively verifiable way. Read More

Authenticity (authenticity)

by Henk van Cann

Posted on July 15, 2022

Definition The quality of having an objectively verifiable origin; contrast veracity. When a newspaper publishes a story about an event, every faithful reproduction of that story may be authentic — but that does not mean the story was true (has veracity). Read More

Autonomic Identifier (AID)

by Daniel Hardman

Posted on July 15, 2022

Definition An identifier that is self-certifying and self-sovereign. Read More

Chain of Custody (CoC)

by Henk van Cann

Posted on July 15, 2022

Definition From Wikipedia (Source): Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. Of particular importance in criminal cases, the concept is also applied in civil litigation... Read More

Composable Event Streaming Representation (CESR)

by Henk van Cann

Posted on July 15, 2022

Definition This compact encoding scheme fully supports both textual and binary streaming applications of attached crypto material of all types. This approach includes composability in both the textual and binary streaming domains. The primitives may be the minimum possible but still composable size. Making composability a guaranteed property allows future... Read More

Controller (controller)

by Henk van Cann

Posted on July 15, 2022

Definition The entity that has the ability to make changes to an identity, cryptocurrency or verifiable credential. The controller of an autonomous identifier is the entity (person, organization, or autonomous software) that has the capability, as defined by derivation, to make changes to an Event Log. This capability is typically... Read More

Credential (cred)

by Henk van Cann

Posted on July 15, 2022

Definition Evidence of authority, status, rights, entitlement to privileges, or the like. (source) Read More

Digest (digest)

by Henk van Cann

Posted on July 15, 2022

verifiable cryptographic commitment From Wikipedia (Source): A digest is a cryptographic hash function (CHF) is a mathematical algorithm that maps data of an arbitrary size (often called the “message”) to a bit array of a fixed size (the “hash value”, “hash”, or “message digest”). It is a one-way function, that... Read More

Digital Signature (d-signature)

by Henk van Cann

Posted on July 15, 2022

Definition A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authentication), and that the message was not... Read More

Directed Acyclic Graph (DAG)

by Henk van Cann

Posted on July 15, 2022

Definition From Wikipedia (source): In mathematics, particularly graph theory, and computer science, a directed acyclic graph (DAG /ˈdæɡ/ (listen)) is a directed graph with no directed cycles. That is, it consists of vertices and edges (also called arcs), with each edge directed from one vertex to another. Why a directed... Read More

Electronic Signature (e-signature)

by Henk van Cann

Posted on July 15, 2022

Definition An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign. This type of signature has the same legal standing as a handwritten signature as long as it adheres to... Read More

Key Event Receipt Infrastructure" (KERI)

by Henk van Cann

Posted on July 15, 2022

Definition A new approach to decentralized identifiers and decentralized key management that promises significant benefits for SSI (self-sovereign identity) and ToIP (Trust over IP) infrastructure. (@drummondreed) KERI is an identifier system that fixes the internet. It’s a fully decentralized permission-less key management architecture. It solves the secure attribution problem to... Read More

Out Of Band Introduction (OOBI)

by Henk van Cann

Posted on July 15, 2022

Definition Out-of-band Introductions are discovery and validation of IP resources for KERI autonomic identifiers. Discovery via URI, trust via KERI. The simplest form of a KERI OOBI is a namespaced string, a tuple, a mapping, a structured message, or structured attachment that contains both a KERI AID and a URL.... Read More

Prefix (prefix)

by Henk van Cann

Posted on July 15, 2022

Definition A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key. Including the derivation code in the prefix binds the derivation process along with the public key to the resultant identifier. An example of the prefix... Read More

Proof of Authority (PoAuthTy)

by Henk van Cann

Posted on July 15, 2022

Definition Proof that somebody or something has certain rights or permissions. It’s about data. Whereas proof of authorship is about data and its original creator. A proof-of-authority provides verifiable authorizations or permissions or rights or credentials. ACDC and proofs Proof of authorship and proof of authority are integrated in Authentic... Read More

Proof of Authorship (PoAuthShip)

by Henk van Cann

Posted on July 15, 2022

Definition Proof that somebody or something has originally created certain content. It’s about data. Whereas proof-of-authority is about rights. For example, a signature constitutes direct proof of authorship; less directly, handwriting analysis may be submitted as proof of authorship of a document.[21] Privileged information in a document can serve as... Read More

Provenance (provenance)

by Henk van Cann

Posted on July 15, 2022

Defintion From Wikipedia (Source): Provenance (from the French provenir, ‘to come from/forth’) is the chronology of the ownership, custody or location of a historical object.[1] The term was originally mostly used in relation to works of art but is now used in similar senses in a wide range of fields,... Read More

Secure Attribution (secure-attr)

by Henk van Cann

Posted on July 15, 2022

Definition In short: secure attribution is “whodunit?!” in cyberspace. Secure attribution is strongly related to making and proving statements. A controller makes statements to the a validator or verifier, who in turn validates the statements issued. A controller “owns” the statement: content and attribution via digital signatures. Secure attribution of... Read More

Self-Adressing IDentifier (SAID)

by Henk van Cann

Posted on July 15, 2022

Definition An identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evident. To generate a SAID Fully populate the data that the SAID will identify, leaving a placeholder for the value of the SAID itself. Canonicalize the data, if needed.... Read More

Self-Certifying Identifier (SCI)

by Henk van Cann

Posted on July 15, 2022

Definition A Self-Certifying Identifier cryptographically binds an identifier to a public and private key pair. It is an identifier that can be proven to be the one and only identifier tied to a public key using cryptography alone. Signing A controller issues an own Identifier by binding a generated public... Read More

Validator (validator)

by Henk van Cann

Posted on July 15, 2022

Definition Validator of any verifiable data structure Validator as a node in distributed consensus or participant Validator and verifier are synonyms for our purposes. A validator in KERI and ACDC is anybody that wants to establish control-authority over an identifier, created by the controller of the identifier. Validators verify the... Read More

Veracity (veracity)

by Henk van Cann

Posted on July 15, 2022

Definition The quality of being true; contrast authenticity. When a newspaper publishes a story about an event, every faithful reproduction of that story may be authentic — but that does not mean the story was true (has veracity). Read More

Verifier (verifier)

by Henk van Cann

Posted on July 15, 2022

See validator, we consider validator and verifier being synonyms. Read More

Text can be bold, italic, or strikethrough.

Link to another page.

There should be whitespace between paragraphs.

There should be whitespace between paragraphs. We recommend including a README, or a file with information about your project.

Header 1

This is a normal paragraph following a header. GitHub is a code hosting platform for version control and collaboration. It lets you and others work together on projects from anywhere.

Header 2

This is a blockquote following a header.

When something is important enough, you do it even if the odds are not in your favor.

Header 3

// Javascript code with syntax highlighting.
var fun = function lang(l) {
  dateformat.i18n = require('./lang/' + l)
  return true;
}
# Ruby code with syntax highlighting
GitHubPages::Dependencies.gems.each do |gem, version|
  s.add_dependency(gem, "= #{version}")
end

Header 4

Header 5
  1. This is an ordered list following a header.
  2. This is an ordered list following a header.
  3. This is an ordered list following a header.
Header 6
head1 head two three
ok good swedish fish nice
out of stock good and plenty nice
ok good oreos hmm
ok good zoute drop yumm

There’s a horizontal rule below this


Here is an unordered list

And an ordered list

  1. Item one
  2. Item two
  3. Item three
  4. Item four

And a nested list

Small image

Octocat

Large image

Branching

Definition lists can be used with HTML syntax

Name
Godzilla
Born
1952
Birthplace
Japan
Color
Green
Long, single-line code blocks should not wrap. They should horizontally scroll if they are too long. This line should be long enough to demonstrate this.
The final element.