Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 75 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
The KERI suite is the comprehensive set of inter-related protocols and technologies developed under the WebOfTrust GitHub organization, including KERI (Key Event Receipt Infrastructure), ACDC (Authentic Chained Data Containers), CESR (Composable Event Streaming Representation), OOBI (Out-of-Band Introduction), and IPEX (Issuance and Presentation Exchange), designed to provide a secure, decentralized identity and verifiable credential infrastructure.
The KERI suite represents a cohesive ecosystem of protocols and technologies that work together to solve fundamental problems in digital identity, secure attribution, and verifiable credentials. Rather than a single monolithic protocol, the KERI suite is an architectural framework consisting of modular, composable components that address different layers of the identity and trust stack.
The suite's core principle is security first, establishing cryptographic verifiability as the non-negotiable foundation upon which all other features are built. This manifests through self-certifying identifiers, duplicity-evident data structures, and end-verifiable proofs that eliminate reliance on trusted intermediaries.
The KERI suite's scope encompasses:
The boundaries of the suite are defined by its focus on cryptographic verifiability rather than semantic interpretation, autonomic control rather than federated authority, and duplicity detection rather than consensus-based ordering.
The KERI suite emerged from decades of work on decentralized identity systems, addressing fundamental limitations in both traditional PKI (Public Key Infrastructure) and blockchain-based identity solutions.
Traditional PKI systems like X.509 certificates and DNS/CA infrastructure suffer from:
The KERI suite has multiple implementations across programming languages:
keripy (Python) serves as the reference implementation, providing 100% compliance with KERI, ACDC, and CESR specifications. It is actively maintained and used in production deployments.
KERIA (KERI Agent in the cloud) provides cloud-based agent services with three-interface architecture:
Signify (TypeScript and Python) provides edge agent libraries for client-side operations with minimal cryptographic overhead, enabling browser and mobile applications.
Implementations exist in Rust (cesride, keri-ox), Go (kerigo), Swift (keriox-swift), and Java (keri-java-api), though these vary in completeness and maintenance status.
The KERI suite specifications are governed by the Trust over IP Foundation's Technical Stack Working Group. Specifications are maintained as ToIP Draft documents with regular community calls for implementors and specification development.
The suite evolved from initial work at the Decentralized Identity Foundation (DIF) through IETF draft phases before settling at ToIP for current governance.
KERISSE (weboftrust.github.io/WOT-terms) provides:
vLEI Trainings (GLEIF-IT/vlei-trainings) offers:
The KERI community maintains:
These systems require users to trust intermediaries to correctly bind identifiers to public keys, creating single points of failure and limiting true self-sovereignty.
Early blockchain-based identity systems (DIDs on ledgers) attempted to solve PKI's centralization problem but introduced new issues:
The KERI suite was designed to provide the benefits of decentralized identity (self-sovereignty, cryptographic verifiability) without the drawbacks of either centralized PKI or blockchain-based approaches.
The KERI suite evolved through several phases:
This modular evolution allowed each component to be developed, tested, and refined independently while maintaining clear interfaces between layers.
The KERI suite's approach is fundamentally different from both traditional and blockchain-based identity systems in several key ways:
KERI introduces autonomic identifiers (AIDs) that are:
This creates a cryptographic root-of-trust that doesn't depend on DNS, certificate authorities, or blockchain consensus.
Instead of relying on a single current key state, KERI maintains a Key Event Log (KEL) - an append-only, cryptographically chained log of all key state changes. This provides:
The KEL architecture solves the "key state at rest" problem - maintaining verifiable key state over time without continuous reconstruction.
CESR (Composable Event Streaming Representation) provides a dual text-binary encoding that:
This encoding layer is critical for making KERI practical at internet scale, enabling efficient transmission and storage while maintaining verifiability.
ACDCs extend KERI's trust basis to verifiable credentials through:
ACDCs solve the "verifiable credentials without blockchain" problem by anchoring credential state to KELs rather than requiring ledger transactions.
OOBI (Out-of-Band Introduction) provides discovery mechanisms that:
This eliminates the need for centralized service endpoints or universal registries while still enabling practical discovery.
IPEX recognizes that all credential exchanges are disclosure operations, unifying:
This unified model simplifies implementation, reduces attack surface, and enables consistent tooling across different credential workflows.
The KERI suite enables several critical use cases:
Enterprise Identity Management: Organizations can issue verifiable credentials to employees, partners, and customers without depending on external identity providers. The vLEI (verifiable Legal Entity Identifier) ecosystem demonstrates this at scale, with GLEIF using the KERI suite to issue credentials to legal entities worldwide.
Supply Chain Provenance: Products can carry verifiable credentials throughout their lifecycle, with each participant in the supply chain adding attestations without requiring a shared blockchain. The KERI suite's efficient encoding and graduated disclosure support high-volume, privacy-preserving supply chain applications.
Secure Attribution: Any data exchanged across trust domain boundaries can be cryptographically attributed to its source through KERI-based signatures. This "fixes the broken internet" by enabling verification of "who said what" without intermediaries.
Credential Ecosystems: The KERI suite supports complex credential chains where credentials reference other credentials (through edge operators), enabling rich authorization models without centralized policy enforcement.
The KERI suite provides several key benefits:
True Self-Sovereignty: Controllers maintain complete authority over their identifiers without requiring permission from certificate authorities, blockchain validators, or other intermediaries. Key rotation, delegation, and revocation are all autonomic operations.
Cryptographic Verifiability: All operations are end-verifiable through cryptographic proofs. Validators can verify identifier control, credential authenticity, and data integrity without trusting infrastructure providers.
Scalability: The KERI suite achieves internet-scale performance through:
Portability: Identifiers and credentials can move between platforms, witness pools, and infrastructure providers while maintaining verifiable continuity. This prevents vendor lock-in and enables true data portability.
Privacy Preservation: Graduated disclosure, selective disclosure, and compact disclosure mechanisms enable privacy-preserving credential presentations. Issuers can create credentials with privacy-preserving properties built in.
Quantum Resistance: Key pre-rotation enables recovery from quantum attacks by committing to next keys before current keys are compromised. The suite's crypto-agility supports algorithm transitions.
The KERI suite's design involves several important trade-offs:
Complexity vs. Security: The suite's security-first approach results in more complex protocols than simpler alternatives. Understanding concepts like key pre-rotation, witness pools, and duplicity detection requires significant learning investment.
Infrastructure Requirements: While KERI eliminates blockchain dependencies, it requires witness infrastructure, watcher networks, and potentially judge/jury pools for production deployments. Organizations must either run this infrastructure or rely on service providers.
Adoption Barriers: The KERI suite represents a fundamentally different approach to identity than traditional PKI or blockchain systems. This paradigm shift creates adoption friction, requiring education and tooling development.
Semantic Limitations: KERI focuses on cryptographic verifiability, not semantic interpretation. The suite doesn't solve problems like credential schema standardization, governance frameworks, or business logic - these must be built on top of KERI's trust basis.
Witness Trust Model: While KERI eliminates single points of failure, it requires trusting witness pools to provide consistent event logs. The threshold of accountable duplicity (TOAD) mechanism mitigates this, but witness selection remains a critical operational decision.
The KERI suite integrates with broader identity ecosystems through:
DID Methods: The did:keri and did:webs methods enable KERI identifiers to participate in W3C DID-based systems while maintaining KERI's security properties.
Verifiable Credentials: ACDCs can be presented in contexts expecting W3C Verifiable Credentials, with transformations between formats maintaining cryptographic integrity.
Enterprise Systems: KERIA (KERI Agent in the cloud) provides REST APIs for enterprise integration, enabling existing systems to leverage KERI infrastructure without deep protocol knowledge.
Educational Resources: KERISSE (KERI Suite Search Engine) provides searchable documentation, glossaries, and tutorials to support developer onboarding and implementation.
The KERI suite represents a comprehensive solution to digital identity and verifiable credentials that prioritizes security, self-sovereignty, and cryptographic verifiability while maintaining practical scalability and usability.
Production deployments require:
Organizations must decide whether to self-host infrastructure or rely on service providers, balancing control, cost, and operational complexity.