Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 20 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Attributional trust is cryptographically verifiable proof that a specific entity made a particular statement or claim, established through KERI's self-certifying identifiers and event logs without requiring trusted intermediaries.
Attributional trust represents the cryptographic certainty that a digital statement, credential, or action can be verifiably attributed to a specific controlling entity. Unlike traditional trust models that rely on organizational reputation or third-party verification, attributional trust is established through mathematical proof using asymmetric cryptography and verifiable data structures.
The core principle is secure attribution - answering the fundamental question "who said what?" in cyberspace with cryptographic certainty. This form of trust provides:
Attributional trust is necessary but not sufficient for comprehensive trust relationships. As Samuel Smith's Universal Identifier Theory emphasizes: "you can't have reputation without attributional trust." Attribution establishes who made a claim, while complementary mechanisms like reputational trust establish whether that entity should be trusted based on their history and standing.
Traditional internet security architectures suffer from a fundamental flaw identified in KERI specifications: the Internet Protocol lacks an inherent security layer for verifiable authenticity. IP packet headers can be forged by intermediaries, meaning recipients cannot determine whether packets originated from legitimate sources or imposters. This architectural deficiency necessitates security overlays.
Historically, three trust basis models have emerged:
Traditional PKI systems rely on Certificate Authorities (CAs) and DNS infrastructure to establish identity mappings. These systems provide administrative trust through organizational reputation but suffer from:
Blockchain and distributed ledger systems provide algorithmic trust through consensus mechanisms. While offering improved decentralization, they:
Cryptographic self-certification provides autonomic trust through mathematical properties of one-way functions. This approach, which KERI implements, offers:
KERI establishes attributional trust through its autonomic trust basis architecture, which fundamentally differs from traditional approaches by making cryptographic self-certification the primary root-of-trust.
KERI uses Self-Certifying Identifiers as the foundation for attributional trust. An SCID is cryptographically derived from the public key of an asymmetric keypair using one-way functions with 128+ bits of cryptographic strength. The identifier itself contains or uniquely determines the public key, creating a self-contained cryptographic root-of-trust.
Example SCID format:
EXq5YqaL6L48pf0fu7IUhL0JRaU2_RxFP0AL43wYn148
The derivation code prefix ("E" in this example) indicates the cryptographic algorithm used, while the remainder is the Base64-encoded public key material. Any signature made with the corresponding private key can be verified by extracting the public key from the identifier itself.
Autonomic Identifiers extend basic SCIDs with key rotation capabilities, making them persistent rather than ephemeral. This addresses the critical limitation that compromised keys would otherwise require identifier abandonment. AIDs maintain attributional trust across key rotations through:
KERI's OOBI protocol provides a low-friction mechanism for establishing attributional trust. An OOBI is a URL that associates an AID with a service endpoint, enabling:
The Universal Identifier Theory whitepaper emphasizes that OOBI-based attributional trust establishment has significantly lower friction than traditional identity assurance processes, which require extensive verification by trusted parties like GLEIF.
KERI's attributional trust creates trust domains - ecosystems of interactions that rely on a cryptographic trust basis. Within these domains, KERI enables the aid|lid couplet model:
This model resolves Zooko's triangle by separating security (AIDs) from human meaningfulness (LIDs) while maintaining verifiable authorization between them.
KERI's attributional trust is end-verifiable, meaning any party can independently verify attribution by:
This process requires no trust in intermediaries - verification depends solely on cryptographic properties and the verifier's ability to detect duplicity.
Verifiable Credentials: ACDCs (Authentic Chained Data Containers) leverage attributional trust to create credentials where:
Legal Entity Verification: The vLEI ecosystem uses attributional trust to:
Secure Communications: Attributional trust enables:
Decentralization: Attributional trust eliminates dependence on centralized authorities for identity verification. Controllers maintain direct cryptographic control over their identifiers without requiring permission from or trust in third parties.
Portability: KELs are portable verifiable data structures that can be stored, transmitted, and verified across any infrastructure. Attributional trust is not locked to specific platforms, blockchains, or service providers.
Security: Cryptographic strength (typically 128+ bits of entropy) provides security properties that exceed organizational security measures. Pre-rotation mechanisms offer post-quantum security through forward-blinded commitments.
Scalability: End-verifiable proof enables parallel verification without coordination. Witnesses provide duplicity detection without requiring global consensus, allowing horizontal scaling.
Ambient Verifiability: Any party can verify attribution at any time without online interaction with the identifier controller. This enables asynchronous verification and offline use cases.
Insufficient Alone: Attributional trust proves who made a statement but not whether that entity should be trusted. Real-world systems require complementary reputational trust mechanisms to assess trustworthiness based on history and standing.
Key Management Burden: Controllers must securely manage private keys and maintain KEL integrity. While KERI provides mechanisms like pre-rotation for recovery, key compromise remains a risk that requires operational discipline.
Discovery Dependency: Attributional trust requires discovering the authoritative KEL for an AID. While OOBIs provide low-friction discovery, initial bootstrapping still requires some out-of-band communication.
Witness Coordination: Witnesses must be available and responsive for optimal operation. While KERI's KAACE algorithm provides Byzantine fault tolerance, witness unavailability can delay verification.
Human Meaningfulness: AIDs are cryptographic identifiers that are not human-memorable. The aid|lid couplet model addresses this through authorized human-meaningful identifiers, but this adds complexity to the trust model.
The Universal Identifier Theory emphasizes that attributional trust and reputational trust are complementary, not competing trust models:
Organizations like GLEIF provide reputational trust through identity assurance processes that verify legal entity status, organizational structure, and authorized representatives. This "heavy-lifting" complements KERI's attributional trust by adding institutional verification to cryptographic proof.
The vLEI ecosystem demonstrates this complementarity:
This layered model enables verifiable reputation - reputation that is cryptographically attributable to specific entities through KERI's mechanisms while being established through traditional identity assurance processes.
When designing identity systems, distinguish between:
KERI provides the attributional trust layer; reputational trust must be layered on top through governance frameworks and identity assurance processes.
Attributional trust requires discovering authoritative KELs. Implementation strategies include:
Attributional trust strength depends on witness configuration:
Maintaining attributional trust requires:
Attributional trust provides the cryptographic foundation for governance frameworks: