Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 69 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A property indicating that control authority over a digital identifier or asset cannot be transferred to another entity in an unobstructed or loss-less manner, either due to technical constraints (non-rotatable keys) or legal/governance restrictions.
Non-transferable describes a fundamental property of digital identifiers and assets where control authority cannot be transferred between entities while maintaining the identifier's integrity and continuity. This property stands in direct opposition to transferable identifiers, which support key rotation and control transfer mechanisms.
In the context of cryptographic identity systems, non-transferability manifests in two primary ways:
The core properties of non-transferable systems include:
The concept of non-transferable identifiers has roots in early public key infrastructure (PKI) systems where certificates were bound to specific key pairs without rotation mechanisms. Traditional X.509 certificates, for example, are fundamentally non-transferable—if a private key is compromised, the certificate must be revoked and a new certificate with a different identifier issued.
In blockchain systems, non-transferable tokens (often called "soulbound tokens" or SBTs) emerged as a mechanism for representing credentials, achievements, or affiliations that should not be traded or transferred between accounts. This concept addresses the challenge of creating verifiable digital credentials that maintain their meaning only when bound to their original recipient.
When implementing non-transferable identifiers, the critical parameters are:
ncount=0: Zero next keys must be specified in the inception eventnsith=0: Zero rotation threshold must accompany the zero next key countndigers=[]: The next key digest list must be emptyThese parameters are validated during inception event processing. Any attempt to create rotation events for such identifiers will be rejected by validators.
Validators can optimize processing for non-transferable identifiers:
When implementing witness nodes with non-transferable identifiers:
To implement identifier abandonment:
ncount=0 and nsith=0Non-transferable identifiers enable storage optimizations:
Key Protection: Since non-transferable identifiers cannot recover from key compromise, implement:
The distinction between transferable and non-transferable identifiers became particularly important with the development of Self-Sovereign Identity (SSI) systems, where different use cases require different persistence and control transfer properties.
KERI explicitly supports non-transferable identifiers as a distinct identifier type with specific architectural characteristics. According to the KERI specification, a non-transferable identifier is created when:
ncount=0 (zero next keys)nsith=0 (zero rotation threshold)This configuration creates an AID (Autonomic Identifier) that is cryptographically bound to its initial key pair with no mechanism for key rotation. The identifier's KEL (Key Event Log) will contain only the inception event and any subsequent interaction events, but no rotation events.
KERI's non-transferable identifiers exhibit several advantageous properties for specific use cases:
Short-lived: Designed for temporary interactions where long-term persistence is not required. The identifier can be safely discarded after its purpose is fulfilled without concern for key management or recovery.
Peer-to-peer: Ideal for direct entity-to-entity communications where the relationship is ephemeral and does not require persistent identity across sessions.
One-time use: Suitable for single-purpose scenarios such as:
Discardable: Can be abandoned without complex key revocation procedures. Since there's no rotation capability, there's no risk of unauthorized future use if the identifier is simply discarded.
Interestingly, KERI's witness infrastructure commonly uses non-transferable identifiers. According to the vLEI Ecosystem Governance Framework Technical Requirements, witnesses typically employ non-transferable AIDs because:
KERI also supports converting a transferable identifier into a non-transferable one through the abandoned identifier mechanism. An AID becomes abandoned when:
ndigers=0)nsith=0)This provides a cryptographically verifiable way to permanently terminate an identifier's lifecycle while maintaining the integrity of its historical event log.
1. Ephemeral Sessions
Non-transferable identifiers excel in scenarios requiring temporary authentication:
The lack of rotation capability is not a limitation here because the identifier's lifetime is intentionally brief.
2. Witness and Infrastructure Nodes
As noted in KERI's architecture, witness nodes benefit from non-transferable identifiers because:
3. Single-Purpose Credentials
Certain credentials are inherently non-transferable by design:
While the underlying identifier might be transferable, governance frameworks can enforce non-transferability at the credential level.
4. Privacy-Preserving Interactions
Non-transferable identifiers support privacy through:
Simplicity: Non-transferable identifiers have significantly simpler key management requirements. There's no need for:
Performance: Validation of non-transferable identifiers requires only:
This makes verification faster and more efficient, particularly important for high-volume scenarios.
Security Model: For ephemeral use cases, non-transferability can enhance security:
No Recovery: If the private key is lost or compromised, the identifier is permanently unusable. There is no rotation mechanism to recover control.
Limited Lifespan: Non-transferable identifiers are unsuitable for long-term persistent identity where key rotation is a security necessity.
No Delegation: The lack of rotation capability also prevents delegation hierarchies, limiting organizational use cases.
Governance Constraints: For credentials that must remain valid over extended periods, non-transferable identifiers create challenges:
The choice between transferable and non-transferable identifiers represents a fundamental architectural decision:
| Aspect | Non-Transferable | Transferable |
|---|---|---|
| Key Rotation | Not supported | Supported via pre-rotation |
| Persistence | Ephemeral | Long-term |
| Complexity | Low | Higher |
| Recovery | Not possible | Possible via rotation |
| Use Case | Temporary, single-purpose | Persistent identity |
| Validation | Inception event only | Full KEL history |
Beyond technical non-transferability, governance frameworks can impose non-transferability requirements on otherwise transferable identifiers. The vLEI Ecosystem Governance Framework demonstrates this through:
Credential-Level Restrictions: Even though the underlying AIDs are transferable, certain vLEI credentials are designated as non-transferable:
Contractual Enforcement: The vLEI governance framework uses contractual mechanisms to enforce non-transferability:
This demonstrates that non-transferability can be a policy layer on top of technically transferable infrastructure, providing flexibility in governance models.
Non-transferable identifiers represent a fundamental primitive in KERI's composable architecture, optimized for ephemeral, single-purpose use cases where the complexity of key rotation is unnecessary or undesirable. By explicitly supporting both transferable and non-transferable identifier types, KERI enables developers to choose the appropriate security and persistence model for their specific requirements.
The distinction between transferable and non-transferable identifiers is not merely technical—it reflects different trust models, use cases, and governance requirements. Understanding when to use each type is essential for designing secure, efficient identity systems that balance security, usability, and operational complexity.
Lifetime Management: Implement explicit lifetime tracking:
When implementing governance frameworks with non-transferable requirements: