Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 17 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A privacy protection mechanism where contractual restrictions and liability imposed on a recipient of a disclosed ACDC are contractually linked to all subsequent recipients, creating a chain of confidentiality obligations that travels with the data downstream to prevent unpermissioned exploitation.
Chain-link confidential disclosure is a legal and contractual mechanism designed to protect the privacy and confidentiality of data disclosed through ACDC (Authentic Chained Data Container) presentations. Unlike traditional one-time confidentiality agreements that bind only the immediate recipient, chain-link confidential disclosure creates a perpetual chain of obligations where each party that receives disclosed information inherits and must maintain the confidentiality constraints established by the original discloser.
The mechanism operates by imposing contractual restrictions and liability on the initial recipient (Disclosee) of a disclosed ACDC. These obligations do not terminate with the first recipient—instead, they are contractually linked to all subsequent recipients as the information moves downstream through multiple parties. This creates what the name suggests: a "chain link" where confidentiality protections are transferred and maintained across the entire lifecycle of the disclosed data.
Key properties of chain-link confidential disclosure include:
The concept of chain-link confidentiality originates from legal scholarship, specifically the work of Woodrow Hartzog in his paper "Chain-Link Confidentiality" (available at SSRN: ). Hartzog's research addressed a fundamental problem in data privacy: how to maintain confidentiality obligations when information passes through multiple parties in a disclosure chain.
Implementing chain-link confidential disclosure requires establishing a legal framework that includes:
Chain-link confidential disclosure is implemented through the IPEX protocol's presentation exchange mechanisms. Key integration points include:
For ecosystems like vLEI, chain-link confidential disclosure requires governance frameworks that specify:
Organizations implementing chain-link confidential disclosure must account for:
Traditional confidentiality agreements typically create a bilateral relationship between two parties—a discloser and a recipient. Once the recipient shares that information with a third party, the original confidentiality obligations often do not automatically transfer. This creates a "confidentiality gap" where data can leak through successive disclosures, even if the original disclosure was protected.
Hartzog's chain-link confidentiality model proposed that confidentiality obligations should be structurally embedded in the disclosure itself, such that anyone receiving the information automatically inherits the confidentiality constraints. This approach draws inspiration from property law concepts where certain rights and restrictions "run with the land"—they attach to the property itself rather than just to specific parties.
In the context of digital identity and verifiable credentials, this legal framework becomes particularly important because:
Within the KERI ecosystem, chain-link confidential disclosure is implemented as a core privacy mechanism for ACDC presentations through the IPEX (Issuance and Presentation Exchange) protocol. The KERI approach integrates legal confidentiality frameworks with cryptographic verification mechanisms to create a comprehensive data protection system.
Chain-link confidential disclosure works in conjunction with KERI's graduated disclosure mechanisms. Graduated disclosure allows an ACDC holder to progressively reveal information through multiple stages:
At each stage of graduated disclosure, the discloser can impose contractual protections through chain-link confidentiality. This means:
The ACDC specification makes a critical distinction between two types of "chaining":
These are distinct mechanisms that serve different purposes:
However, they work together synergistically: cryptographically chained ACDCs can be disclosed under chain-link confidentiality protections, with the cryptographic structure providing verifiable authenticity while the confidentiality framework provides legal protection.
A key feature of KERI's implementation is that chain-link confidentiality is dynamically negotiated on a per-event, per-data exchange basis. This means:
This dynamic approach allows for:
Within the KERI ecosystem, chain-link confidentiality serves as the primary mechanism for granting digital data rights. This is accomplished by:
Chain-link confidential disclosure is specifically designed for presentation exchanges in the IPEX protocol. When a holder presents an ACDC to a verifier:
This mechanism is particularly important for issuance exchanges, where the Issuer discloses a newly issued ACDC to the Issuee. The Issuer can impose confidentiality terms that will bind not just the Issuee, but anyone to whom the Issuee later presents the credential.
Chain-link confidential disclosure addresses several critical use cases in verifiable credential ecosystems:
Enterprise Credential Sharing: When a legal entity receives a vLEI (verifiable Legal Entity Identifier) credential, they may need to present it to multiple parties (banks, regulators, auditors, business partners). Chain-link confidentiality ensures that each verifier is bound by the same confidentiality obligations, preventing unauthorized data aggregation or correlation.
Healthcare Records: Medical credentials containing sensitive health information can be disclosed to healthcare providers with confidentiality terms that prevent unauthorized sharing with insurance companies, employers, or other third parties.
Financial Services: Financial credentials (credit scores, account balances, transaction histories) can be disclosed to lenders with terms preventing sale to data brokers or use for marketing purposes.
Supply Chain Verification: Product provenance credentials can be disclosed to supply chain participants with terms preventing disclosure to competitors while allowing regulatory inspection.
Educational Credentials: Academic credentials can be disclosed to employers with terms preventing sharing with background check services or credential verification companies without the holder's consent.
Privacy Protection: The primary benefit is maintaining privacy control even after disclosure. Unlike traditional credentials where the holder loses control once disclosed, chain-link confidentiality maintains legal protections throughout the data lifecycle.
Regulatory Compliance: Helps organizations comply with data protection regulations (GDPR, CCPA, etc.) by maintaining documented consent and usage restrictions even as data moves between parties.
Reduced Correlation Risk: By imposing legal consequences for unauthorized correlation or aggregation of disclosed data, chain-link confidentiality reduces the risk of privacy-invasive data practices.
Flexible Business Models: Enables credential holders to monetize their data by imposing usage fees or restrictions on downstream use, creating new economic models for data sharing.
Trust Enhancement: Verifiers are more willing to accept credentials when they know their own obligations are clearly defined and that they won't face unexpected liability from downstream disclosures.
Legal Complexity: Implementing chain-link confidentiality requires careful legal drafting to ensure terms are enforceable across jurisdictions and clearly understood by all parties.
Enforcement Challenges: While the mechanism creates legal obligations, actual enforcement requires legal action, which may be impractical for low-value disclosures or across international boundaries.
User Experience: Requiring recipients to review and agree to confidentiality terms at each disclosure stage can create friction in the user experience, potentially slowing adoption.
Verification Burden: Verifiers must track and manage confidentiality obligations for all credentials they receive, creating operational overhead.
Jurisdictional Variations: Confidentiality laws vary significantly across jurisdictions, requiring terms to be adapted for different legal contexts.
Technical-Legal Gap: The mechanism bridges technical (cryptographic) and legal (contractual) domains, requiring expertise in both areas and creating potential for misalignment.
Despite these trade-offs, chain-link confidential disclosure represents a significant advancement in privacy-preserving credential systems, providing a mechanism for maintaining data rights and confidentiality protections even in complex multi-party disclosure scenarios. When combined with KERI's cryptographic verification mechanisms and graduated disclosure capabilities, it enables a new generation of privacy-respecting verifiable credential applications.