Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 104 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
In KERI/ACDC, a payload refers to the meaningful data content within a message or data structure, as distinguished from the cryptographic and structural overhead required to transmit, verify, or process it. Payloads in KERI are strictly limited to cryptographic building blocks: content digest hashes, Merkle tree root hashes, or public keys.
A payload is the substantive information content within a KERI message or data structure, separated from the supporting infrastructure (headers, signatures, metadata) required for transmission and verification. The term originates from transportation logistics—analogous to cargo in a truck versus the vehicle's weight—and applies to computing contexts where "interesting" data must be distinguished from processing overhead.
In KERI's architecture, payloads have strict constraints: they consist exclusively of cryptographic primitives rather than raw application data. This design principle is fundamental to KERI's security model.
KERI never places raw data or privacy-sensitive information directly in Key Event Logs (KELs) or Key Event Receipt Logs (KERLs). Instead, payloads are limited to three cryptographic building blocks:
This constraint ensures that event logs contain only cryptographic commitments rather than actual data, maintaining privacy while enabling verifiability.
In ACDC (Authentic Chained Data Container) credentials, the payload concept extends to the ( field) and other data-bearing sections. However, ACDCs maintain the same principle: sensitive data can be represented by (Self-Addressing Identifiers) rather than full disclosure, with the SAID serving as a cryptographic commitment to the payload.
aKERI messages follow a consistent pattern:
The payload (body) is what gets signed, while attachments provide the cryptographic proofs. This separation enables composable event streaming where payloads and their proofs can be processed independently.
The payload restriction to cryptographic primitives provides several security benefits:
Different KERI event types have specific payload structures:
In all cases, the payload contains cryptographic material rather than application data, with seals providing the mechanism to anchor arbitrary data to the event log.