Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 90 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A directed acyclic graph (DAG) is a mathematical structure consisting of vertices connected by directed edges with no cycles, meaning following edge directions never forms a closed loop. In KERI/ACDC, DAGs provide the foundational data structure for verifiable credential chains and proof-of-authorship graphs.
A directed acyclic graph (DAG) is a fundamental mathematical structure from graph theory consisting of:
The defining characteristic is that following directions through the graph will never return to a previously visited vertex, ensuring all traversals are finite and terminate. This property is mathematically equivalent to the graph being topologically orderable—vertices can be arranged in a linear sequence where all edge directions respect the ordering.
In the context of identity systems and verifiable credentials, DAGs provide a natural structure for representing:
The acyclic constraint is critical for security: it prevents circular dependencies that could enable infinite loops in verification algorithms, circular delegation chains that undermine authority models, or self-referential structures that could be exploited in attacks.
DAGs have been fundamental to computer science since the 1960s, with applications spanning:
Compilation and Scheduling: Representing task dependencies where some operations must complete before others can begin. The acyclic property ensures schedulability—there exists at least one valid execution order.
Version Control Systems: Git and similar systems use DAGs to represent commit histories, where each commit points to its parent(s). The acyclic property prevents paradoxical histories.
When implementing ACDC DAG structures:
Mandatory DAG Property: The ACDC specification requires that disclosed credentials MUST form a DAG. Implementations must validate this property during presentation exchange by detecting cycles through graph traversal algorithms (depth-first search with cycle detection or topological sort).
Edge Representation: Edges are represented through the e (edges) section of an ACDC, where each edge contains:
n: SAID of the target ACDC (the directed edge destination)s: Schema SAID that the target must conform to (type constraint)o: Edge operator (I2I, DI2I, NI2I) defining relationship semanticsTopological Ordering: Verification algorithms should process credentials in topological order (parents before children) to ensure all dependencies are validated before dependents. This requires either:
Cycle Prevention: Implementations must actively prevent cycle creation:
Partial DAG Disclosure: Support presenting subgraphs of the full credential DAG:
Graph Storage: Consider using graph databases or specialized data structures for efficient DAG operations:
Verification Optimization:
: Large credential DAGs may require:
Blockchain Alternatives: Technologies like IOTA's Tangle and Hedera Hashgraph use DAG structures instead of linear chains, allowing parallel transaction processing while maintaining causal ordering.
Citation Networks: Academic papers form DAGs where edges represent citations—papers can only cite previously published work, naturally creating acyclic structures.
In traditional Public Key Infrastructure (PKI), certificate chains form tree structures (a special case of DAGs) where:
However, traditional PKI certificate chains have significant limitations:
KERI leverages DAG structures in two primary contexts:
Authentic Chained Data Containers (ACDCs) are explicitly designed as labeled property graph fragments that form DAGs when chained together. Each ACDC represents:
A single vertex with:
Zero or more directed edges to other ACDCs via the edges section (e field), where each edge:
The ACDC specification mandates that disclosed ACDCs in a presentation exchange MUST form a DAG with:
This DAG structure enables:
Verifiable Credential Chains: A Legal Entity vLEI credential chains to a QVI credential, which chains to GLEIF's root credential, forming a verifiable path of authority.
Selective Disclosure: A verifier can request specific subgraphs of the credential DAG, receiving only the credentials and edges necessary to verify particular claims.
Graduated Disclosure: Credentials can be presented in compact form (SAIDs only) initially, with full details disclosed progressively as trust relationships develop.
Complex Authorization Patterns: Multi-party authorizations, threshold schemes, and conditional delegations can be expressed through edge operators and logical combinations.
KERI delegation creates hierarchical structures where:
Key properties:
Cooperative Delegation: Both delegator and delegate must cryptographically commit to the delegation through seals in their respective KELs.
Revocability: Delegators can revoke delegations through rotation events, pruning branches of the delegation tree.
Bivalent Security: The delegation DAG enables bivalent key management where:
Scalability: Organizations can create delegation hierarchies matching their operational structure, with each branch independently managed.
The DAG structure enables efficient verification through topological traversal:
This approach provides O(V + E) complexity where V is vertices (credentials) and E is edges (references), making verification computationally tractable even for large credential graphs.
The DAG structure supports duplicity detection by:
vLEI Credential Ecosystem: The GLEIF vLEI implementation creates a five-level DAG:
Each credential cryptographically chains to its parent through edge SAIDs, forming a verifiable DAG from any role credential back to GLEIF's root authority.
Supply Chain Provenance: ACDCs can model supply chain transformations as a DAG where:
The DAG structure naturally represents bill-of-materials relationships and enables verification of complete provenance chains.
Multi-Party Authorizations: Complex business processes requiring multiple approvals can be modeled as DAGs where:
Guaranteed Termination: Verification algorithms always complete because DAG traversal is finite. This prevents denial-of-service attacks through circular credential chains.
Flexible Relationships: Unlike tree structures, DAGs support:
Selective Verification: Verifiers can validate specific subgraphs without processing the entire credential ecosystem, improving privacy and efficiency.
Cryptographic Integrity: Each edge is a SAID reference, creating cryptographic binding between credentials. Tampering with any credential breaks the chain.
Scalability: DAG structures enable:
Complexity: DAG-based credential systems are more complex than simple certificate chains:
Correlation Risk: The graph structure itself can leak information:
Coordination Overhead: Creating credential DAGs requires:
Storage Requirements: Full DAG verification may require:
Despite these trade-offs, the DAG structure is fundamental to ACDC's ability to provide verifiable, chainable, privacy-preserving credentials that support complex real-world authorization and delegation patterns while maintaining cryptographic integrity and enabling efficient verification.