Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 91 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Ephemeral describes something lasting for a markedly brief time with a short lifespan. In the KERI/ACDC ecosystem, this term specifically characterizes identifiers, cryptographic keys, and data structures intentionally designed for temporary use rather than persistent identity representation.
KERI's architecture includes non-transferable identifiers as a fundamental primitive specifically suited for ephemeral use cases. These identifiers have a critical limitation: their controlling keys cannot be rotated. This constraint makes them inherently ephemeral—if keys are compromised, the identifier must be abandoned entirely.
Technical implications:
Ephemeral identifiers are much easier to govern than persistent identifiers because:
Advantages:
Limitations:
KERI's inclusion of ephemeral identifiers as a core primitive reflects the composable primitives design philosophy: rather than forcing all identifiers into a single model, KERI provides distinct primitives (transferable, non-transferable, delegated) that can be selected based on specific use case requirements. This enables developers to choose the appropriate security/complexity trade-off for each identity context.
Basic self-certifying identifiers (SCIDs) are fundamentally ephemeral because they lack key rotation support. The KERI specification explicitly notes: "If the controlling private key becomes weakened or compromised through exposure, the SCID must be completely abandoned." This ephemeral nature distinguishes basic SCIDs from KERI's more sophisticated Autonomic Identifiers (AIDs), which support persistent control through key rotation mechanisms.
KERI witnesses often use non-transferable (ephemeral) AIDs for their own identifiers. Rather than relying on individual key rotation, witness security comes from pool-based threshold structures. This design choice reflects that witness identifiers serve infrastructure roles rather than persistent identity needs.
Ephemeral identifiers serve critical privacy functions by enabling:
The SPAC (Secure Privacy, Authenticity, and Confidentiality) framework recognizes ephemeral identifiers as a key privacy mechanism, though it notes that privacy protection is a "hot war" requiring ongoing tactical adaptation.
Appropriate scenarios for ephemeral identifiers:
Inappropriate scenarios: