Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 127 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Confidentiality in KERI refers to the protection of message content and data from unauthorized access through encryption and access control mechanisms, ensuring that only authorized parties can view disclosed information. It is the second priority in KERI's security model after , and is constrained by the PAC Theorem which states that systems cannot simultaneously maximize , authenticity, and confidentiality.
Confidentiality is a fundamental security property that ensures all statements in a conversation are only known by the parties to that conversation. In the context of KERI and digital identity systems, confidentiality specifically addresses the protection of content data - what information is disclosed and to whom - through cryptographic mechanisms like encryption and access control.
The concept extends beyond simple encryption to encompass:
Confidentiality is distinct from but complementary to authenticity (proving who said what) and privacy (protecting metadata about who participated in communications). These three properties form an interconnected security framework where confidentiality specifically addresses the "what" of information protection.
A critical theoretical foundation for understanding confidentiality in KERI is the PAC Theorem (Privacy, Authenticity, Confidentiality), which establishes a fundamental constraint:
"One can have any two of the three (privacy, authenticity, confidentiality) at the highest level but not all three."
This theorem, central to KERI's design philosophy, means that:
The Trust over IP (ToIP) design goals that guide KERI establish a clear priority ordering:
This ordering reflects KERI's architectural philosophy: build on a foundation of cryptographically verifiable authenticity, layer confidentiality mechanisms on top, and then maximize privacy without compromising the first two properties. The rationale is that privacy protections are meaningless without authentic attribution - you cannot have meaningful privacy if you cannot verify who you're communicating with.
KERI implements confidentiality through well-established cryptographic primitives rather than complex zero-knowledge proofs or novel cryptographic constructions. The SPAC (Secure Private Authentic Confidentiality) framework specifies:
Strong Confidentiality via IND-CCA2: KERI requires IND-CCA2 (Indistinguishability under Adaptive Chosen Ciphertext Attack) security for confidential communications. This is achieved through:
Combined Security: ESSR Protocol: For scenarios requiring both authenticity and confidentiality, KERI specifies the ESSR (Encrypt Sender Sign Receiver) protocol:
KERI's ACDC (Authentic Chained Data Container) credential framework implements sophisticated confidentiality mechanisms through graduated disclosure:
Compact Disclosure: ACDCs can be disclosed in compact form where only SAIDs (Self-Addressing Identifiers) are revealed instead of full content. This provides:
Partial Disclosure: Specific sections of an ACDC can be revealed while others remain as SAIDs, enabling:
Selective Disclosure: Individual attributes can be disclosed independently through:
Private ACDCs: For maximum confidentiality, ACDCs can include high-entropy UUIDs as "salty nonces" that:
KERI extends technical confidentiality with legal frameworks through contractually protected disclosure:
Chain-Link Confidentiality: This mechanism creates legally binding confidentiality obligations that:
Contingent Disclosure: Information release is made contingent on:
IPEX Protocol: The Issuance and Presentation Exchange (IPEX) protocol provides the infrastructure for:
KERI mandates end-to-end confidentiality throughout data lifecycle:
Data in Motion: All inter-host communication must be:
Data at Rest: All stored data must be:
KERI makes a critical distinction between confidentiality and privacy:
Confidentiality protects content (what was said) through:
Privacy protects metadata (who participated) through:
This separation enables KERI to provide strong confidentiality guarantees while acknowledging that privacy is a "hot war" requiring ongoing tactical adaptation against evolving correlation techniques. Confidentiality can be achieved with arbitrarily strong cryptographic protection, while privacy faces resource-constrained adversaries with rapidly evolving capabilities.
Enterprise Credential Exchange: Organizations using vLEI credentials can:
Supply Chain Data Sharing: Digital twins of physical supply chains can:
Healthcare Information Exchange: Medical credentials and records can:
Cryptographic Strength: KERI's confidentiality mechanisms provide:
Flexibility: Graduated disclosure enables:
Legal Enforceability: Contractual protections provide:
Complexity: Graduated disclosure mechanisms introduce:
Privacy Limitations: Prioritizing confidentiality means:
Performance Considerations: Strong confidentiality requires:
Confidentiality in KERI is not an isolated feature but deeply integrated with:
Key Event Logs (KELs): While KELs themselves are typically public (to enable ambient verifiability), they can:
Transaction Event Logs (TELs): Support confidential credential management through:
Witness Networks: Confidentiality is maintained even with public witnesses because:
KERI's confidentiality model aligns with zero-trust computing principles:
Never Trust, Always Verify: Confidentiality mechanisms assume:
Minimal Privilege: Graduated disclosure implements:
End-to-End Security: KERI's requirement for signed/encrypted data:
Confidentiality in KERI represents a carefully architected balance between cryptographic protection, practical usability, and legal enforceability. By prioritizing authenticity first and building confidentiality on that foundation, KERI creates systems where confidential information can be shared with strong guarantees about both origin and protection. The graduated disclosure mechanisms in ACDCs, combined with contractual protections and end-to-end encryption, provide a comprehensive framework for confidential data exchange in decentralized identity systems.
The explicit acknowledgment of the PAC Theorem and the prioritization of authenticity over privacy reflects a pragmatic approach: meaningful confidentiality requires verifiable attribution, and privacy protections are most effective when built on a foundation of authentic, confidential communication. This design philosophy enables KERI to provide strong confidentiality guarantees while remaining honest about the inherent trade-offs in cryptographic identity systems.
Encryption Standards: KERI implementations should use:
Key Management: Confidentiality requires careful key management:
Compact Variant: When implementing compact disclosure:
Partial Disclosure: Implementation considerations:
Selective Disclosure: Technical requirements:
Chain-Link Confidentiality: Implementation involves:
IPEX Protocol: When implementing contractually protected disclosure:
Threat Model: Confidentiality implementations must address:
Performance Trade-offs: Consider:
KEL Anchoring: Confidential data should be:
Witness Considerations: When using witnesses:
TEL Integration: For credential management: