Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 193 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A claim is an assertion of truth about a subject, typically expressed as an attribute or property, made by an issuer and requiring verification by a verifier to determine validity.
A claim represents the fundamental unit of assertion in verifiable credential systems, serving as the atomic building block for expressing statements about entities. Within the KERI/ACDC ecosystem, claims are structured assertions that form the substantive content of Authentic Chained Data Containers (ACDCs), providing the actual information being attested to by an issuer.
Every claim consists of three essential elements:
For example, a claim might assert that "Alice (subject) has age (attribute) 25 (value)" or "Organization X (subject) holds LEI (attribute) 549300ABCDEF123456 (value)".
Claims are fundamentally issuer-centric - every claim is made by a specific party called the issuer. The issuer's AID (Autonomic Identifier) appears at the top level of the ACDC structure, cryptographically binding the claim to its originator through digital signatures. This binding provides non-repudiable proof of authorship.
d field with exactly the right number of # characters (44 for Blake3-256).E for Blake3-256).Critically, the validity of a claim must be judged by the verifier. KERI and ACDC provide mechanisms for secure attribution - proving who made the claim - but determining whether the claim is true requires additional verification processes, governance frameworks, and trust decisions by relying parties.
Within ACDCs, claims are encoded in the attributes section (a field), which can be represented in multiple forms:
Compact Form: A SAID (Self-Addressing Identifier) reference to the attributes block:
{
"a": "ELGgI0fkloqKWREXgqUfgS0bJybP1LChxCO3sqPSFHCj"
}
Expanded Form: Full attribute details:
{
"a": {
"d": "ELGgI0fkloqKWREXgqUfgS0bJybP1LChxCO3sqPSFHCj",
"i": "EKA57bKBKxr_kN7iN5i7lMUxpMG-s19dRcmov1iDxz-E",
"dt": "2024-01-15T10:30:00.000000+00:00",
"LEI": "549300ABCDEF123456",
"personLegalName": "Alice Smith",
"officialRole": "Chief Executive Officer"
}
}
Claims within the attributes section follow insertion-ordered field maps, where:
d: SAID of the attributes block itselfi: AID of the issuee (subject) when presentdt: Issuance datetime in ISO-8601 formatThe additionalProperties: false constraint in ACDC schemas ensures no extra fields can be added beyond those defined in the schema, maintaining structural integrity.
Claims are serialized using CESR (Composable Event Streaming Representation) encoding, which supports:
All serializations maintain insertion order to ensure consistent SAID computation across different representations.
Claim creation occurs during ACDC issuance:
ACDCs support selective disclosure of claims through:
Compact Disclosure: Revealing only SAIDs without exposing claim values:
{
"a": "ELGgI0fkloqKWREXgqUfgS0bJybP1LChxCO3sqPSFHCj"
}
Partial Disclosure: Revealing some attributes while keeping others compact:
{
"a": {
"d": "ELGgI0fkloqKWREXgqUfgS0bJybP1LChxCO3sqPSFHCj",
"LEI": "549300ABCDEF123456"
}
}
Full Disclosure: Revealing all claim details when required.
Verification involves multiple steps:
Claims in ACDCs are immutable once issued. Updates require:
Claims are exchanged using IPEX (Issuance and Presentation Exchange) protocol:
Issuance Exchange: Issuer discloses claims to holder:
Issuer → [ACDC with claims] → Holder
Presentation Exchange: Holder discloses claims to verifier:
Holder → [ACDC with claims] → Verifier
In the vLEI (verifiable Legal Entity Identifier) ecosystem, claims include:
Legal Entity Claims:
Role Claims:
ACDCs support claim chaining through edges, creating directed acyclic graphs (DAGs) of related claims:
{
"e": {
"d": "EMsSqaJsthSBA4OINZ1_fxfNVkgEPF-Sg5fq-vXM7Z6b",
"auth": {
"n": "EKA57bKBKxr_kN7iN5i7lMUxpMG-s19dRcmov1iDxz-E",
"s": "EH6ekLjSr8V32WyFbGe1zXjTzFs9PkTYmupJ9H65O14g",
"o": "I2I"
}
}
}
This enables:
When the issuer and subject are identical, claims are self-asserted. These carry different trust implications:
Claim handling must balance:
Verifiability: Claims must be cryptographically verifiable Privacy: Selective disclosure minimizes information leakage Correlation: Multiple presentations of same claims may enable tracking Unlinkability: UUID fields in private ACDCs prevent correlation
Claim validity depends on:
Issuer Authority: Does issuer have authority to make this claim? Verification Standards: What identity assurance level was used? Schema Compliance: Does claim conform to agreed schema? Temporal Validity: Is claim still current and not expired? Revocation Status: Has claim been revoked by issuer?
KERI/ACDC claims align with:
W3C Verifiable Credentials: Claims as credential subjects eSSIF-Lab Framework: Claims as assertions by parties NIST Digital Identity Guidelines: Claims requiring verification ISO Standards: LEI and other standardized claim formats
Claims represent the semantic payload of verifiable credentials, while KERI/ACDC infrastructure provides:
This separation of semantic content (claims) from cryptographic infrastructure (KERI) enables flexible, secure, and privacy-preserving credential systems that can express arbitrary claims while maintaining strong security guarantees.