An Autonomic Identifier (AID) is a self-managing cryptonymous identifier that must be self-certifying (self-authenticating) and encoded in CESR as a qualified cryptographic primitive, providing cryptographic proof of control authority through a verifiableKey Event Log (KEL).
Related Concepts
No related concepts available
Comprehensive Explanation
AID (Autonomic Identifier)
Technical Definition
An Autonomic Identifier (AID) is a self-certifying identifier that maintains a cryptographic binding to its Key Event Log (KEL) according to the KERI specification. The term "autonomic" emphasizes the self-managing nature of these identifiers, distinguishing them from identifiers requiring external administrative authorities or algorithmic consensus mechanisms.
Formal Definition: An AID is a self-certifying identifier (SCID) combined with a Key Event Log that provides verifiable persistent control. The formula is:
AIDs are classified into two fundamental categories:
Non-transferable AIDs: Do not support key rotation; controlling key pairs cannot be changed after inception
Transferable AIDs: Support key rotation through key pre-rotation mechanisms, enabling persistent control despite key compromise
Purpose in KERI/ACDC: AIDs serve as the foundational identity primitive in KERI, providing cryptographically verifiable control authority over identifiers without requiring trusted third parties. They enable:
Decentralized identifier creation and management
Verifiable key rotation and recovery
Delegation hierarchies for scalable governance
Credential issuance and verification in ACDC systems
Cryptographic Properties
Self-Certification Mechanism
AIDs achieve self-certification through cryptographic derivation from public keys using one-way functions. The identifier prefix is computed as:
Implementation Notes
Critical Implementation Requirements
Cryptographic Strength
All AIDs must provide approximately 128 bits of cryptographic strength
Use approved algorithms: Ed25519, ECDSA secp256k1
Generate keys from CSPRNG or true random number generators
Protect pre-rotated keys at highest security level
CESR Encoding Compliance
AIDs MUST be encoded as qualified CESR primitives
Include proper derivation codes prepended to encoded keys
Support both text (Base64 URL-safe) and binary representations
Maintain 24-bit alignment for composability
KEL Management
Inception event must be first and only inception for an AID
Maintain append-only log structure with cryptographic chaining
Validate all signatures using current authoritative keys
Implement duplicity detection across KEL versions
Witness Configuration
vLEI governance requires minimum 5 witnesses
Use KAACE sufficient majority threshold
Implement access control independent of controller keys
Support multiple discovery mechanisms (OOBIs, well-known URIs, DHT)
Delegation Support
Implement cooperative establishment between delegator and delegate
Both parties must participate in rotation events
Delegator creates cryptographic commitment via seals
Delegate references delegator in establishment events
Multi-Signature Coordination
Support asynchronous signature collection
Implement threshold satisfaction checking
Provide mailbox services for message exchange
Handle partial rotation for custodial scenarios
Security Best Practices
Separate signing authority from rotation authority when appropriate
Implement secure key storage with encryption
Use hardware security modules (HSMs) for high-value AIDs
Implement key stretching for password-derived keys
Support partial rotation for reserve key management
Seed → Private Key → One-Way Function → Public Key → Derivation Code + Digest → AID Prefix
Key Pre-Rotation Security
Transferable AIDs implement key pre-rotation, KERI's breakthrough solution to secure key rotation:
Forward Commitment: Each rotation pre-commits to next keys via cryptographic digest
One-Time Use: Rotation keys are used exactly once, minimizing exposure
Post-Quantum Protection: Hidden pre-rotated keys provide resistance to quantum attacks
Unbroken Chain: Maintains continuous cryptographic proof of control authority
The pre-rotation mechanism ensures that compromise of current signing keys cannot affect pre-rotated (unexposed) keys, enabling recovery without external trusted parties.
Cryptographic Strength
AIDs must provide approximately 128 bits of cryptographic strength as mandated by vLEI governance frameworks. Compliant algorithms include:
Ed25519: Edwards-curve Digital Signature Algorithm
ECDSA secp256k1: Elliptic Curve Digital Signature Algorithm
Data Format & Encoding
CESR Encoding Format
AIDs MUST be encoded in CESR (Composable Event Streaming Representation) as qualified cryptographic primitives. The encoding structure consists of:
Derivation Code: Prepended code indicating cryptographic algorithm and key type
Encoded Public Key: Base64 URL-safe encoding of the public key or its digest
Detect Duplicity: Check for conflicting versions of the KEL
Key State Determination:
The current key state is determined by processing the KEL from inception through all establishment events, applying rotations in sequence to arrive at the current authoritative key set.
In ACDC Credentials
AIDs serve multiple roles in ACDC verifiable credentials:
Issuer AID (i field):
Identifies the credential issuer
Appears at top level of ACDC
Provides cryptographic proof of issuance authority
Issuee AID (in a section):
Identifies the credential subject
Optional field (credentials may have no issuee)
Enables holder binding
Controller AIDs:
Control credential registries (TELs)
Manage issuance and revocation state
Anchor credential operations to KELs
Related Primitives
Self-Certifying Identifiers (SCIDs)
AIDs are a specialized form of SCID that adds:
Key rotation capability through KELs
Witness-based consensus
Delegation support
Basic SCIDs are ephemeral (non-transferable), while AIDs enable persistent control.
Self-Addressing Identifiers (SAIDs)
SAIDs provide content-addressable identifiers for data structures. AIDs use SAID derivation for:
Inception event identification (AID prefix = SAID of inception)
Event chaining (each event references previous via SAID)
Credential identification (ACDC d field)
Key Event Logs (KELs)
KELs are the verifiable data structure that makes AIDs "autonomic":
Append-only log of key events
Cryptographically chained (forward and backward)
Provides proof of key state evolution
Enables duplicity detection
Witnesses
Witnesses provide distributed consensus for AIDs:
Designated by controller during inception
Verify, sign, and store key events
Enable indirect mode operation
Support KAACE (KERI's Agreement Algorithm for Control Establishment)
Composition Patterns
AID + SAID + ACDC:
Credentials use AIDs for issuer/issuee identification and SAIDs for content integrity, creating verifiable credential chains.
AID + Delegation + Multi-Sig:
Hierarchical organizations use delegated multi-sig AIDs to distribute control while maintaining root authority.
AID + Witnesses + Watchers:
Distributed infrastructure uses witnesses for consensus and watchers for ambient duplicity detection.