Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 51 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
An authentic provenance chain (APC) is a cryptographically verifiable sequence of linked presentations that traces data back to its origin through objectively verifiable evidence, establishing both proof-of-authorship (who created the data) and [proof-of-authority](/concept/proof-of- "Proof-of-authority is cryptographic evidence that an entity possesses specific r...") (who has rights over the data) through chained data structures.
An authentic provenance chain (APC) represents a fundamental concept in verifiable data systems: the ability to cryptographically trace data back to its origin through an unbroken chain of evidence. Unlike traditional provenance systems that rely on trusted intermediaries or centralized registries, an APC provides objective verifiability—any party can independently verify the chain's integrity using cryptographic primitives without requiring trust in third parties.
The core properties of an authentic provenance chain include:
The scope of APCs extends beyond simple data attribution to encompass complex scenarios involving data transformation, aggregation, custody transfer, and delegated authority. An APC maintains verifiable integrity across these operations, creating what Samuel Smith terms the foundation for an "authentic data economy."
The concept of provenance chains emerged from multiple converging needs in distributed systems:
Historically, provenance tracking relied on:
These traditional methods suffered from fundamental limitations:
The transition to digital systems introduced new challenges:
Early digital solutions like Linked Data and W3C Verifiable Credentials made progress but faced issues:
KERI and its associated ACDC (Authentic Chained Data Container) specification provide a comprehensive solution for authentic provenance chains through several key innovations:
KERI's approach centers on SAID (Self-Addressing IDentifier) protocol, where each data structure includes a cryptographic digest of itself. This creates content-addressable data where:
For APCs, this means each link in the chain is self-verifying and tamper-evident.
ACDCs implement provenance chains through a directed acyclic graph (DAG) structure where:
Proof-of-Authorship Chain: Each ACDC cryptographically commits to:
This creates a verifiable chain proving who originally created the data.
Proof-of-Authority Chain: ACDCs extend authorship chains to track authority through:
KERI's APC implementation supports privacy through graduated disclosure mechanisms:
This enables APCs that protect sensitive information while maintaining verifiability.
APCs in KERI are anchored to KELs (Key Event Logs), providing:
For credential lifecycle management, APCs integrate with TELs (Transaction Event Logs):
vLEI Ecosystem: The verifiable Legal Entity Identifier system demonstrates APCs in production:
Supply Chain Provenance: APCs enable tracking:
Data Processing Pipelines: For streaming data applications:
Digital Rights Management: APCs track:
Objective Verifiability: Any party can verify provenance without:
Scalability: APCs scale through:
Privacy Protection: Through graduated disclosure:
Flexibility: APCs support:
Complexity: Implementing APCs requires:
Storage Requirements: Complete APCs may require:
Initial Setup Overhead: Establishing APCs involves:
Verification Latency: First-time verification requires:
Subsequent verifications are much faster through caching.
Authentic provenance chains represent a foundational primitive in the KERI ecosystem, enabling:
The combination of KERI's key management, ACDC's data containers, and APC's provenance tracking creates a comprehensive infrastructure for the "authentic web"—an internet where data origin and authority are cryptographically verifiable without centralized trust anchors.
Authentic provenance chains are primarily a conceptual and governance framework rather than a specific implementation detail. Key considerations: