Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 157 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Provenance is the documented history of the origin, custody, and transformations of data, establishing a verifiable chain from current state back to original creation. In KERI/ACDC systems, provenance is cryptographically verifiable through chained data structures that maintain and without requiring trusted intermediaries.
Provenance refers to the chronology of ownership, custody, and location of data or objects, providing contextual and circumstantial evidence for authenticity. The term originates from tracking the history of art objects and manuscripts but has expanded to encompass digital data management, where it represents the complete lifecycle documentation of information from creation through all transformations and transfers.
In digital systems, provenance serves three critical functions:
Provenance is distinct from but complementary to authenticity. While authenticity proves who created data and that it hasn't been tampered with, provenance provides the historical context of that data's journey through various transformations and custodians. A newspaper story may have authentic provenance (verifiable publication history) without having veracity (truthfulness of content).
Traditional provenance systems relied on paper trails and trusted intermediaries to document custody chains. In physical supply chains, provenance was maintained through:
These systems suffered from fundamental limitations:
In digital systems, early provenance approaches used:
However, these approaches still required trust in infrastructure operators, lacked portability across systems, or couldn't efficiently handle complex data transformation chains.
KERI implements provenance through ACDC (Authentic Chained Data Container) structures that provide two coherent mechanisms:
1. Cryptographic Verification of Key States
KERI's Key Event Log (KEL) provides verifiable provenance for Autonomic Identifiers (AIDs) through:
This creates an append-only, cryptographically chained log where every key state transition is verifiable back to the identifier's inception. The KEL serves as the provenance record for the identifier's control authority.
2. Credential Attestation Chains
ACDCs extend provenance to data through:
The specification defines Authentic Provenance Chain (APC) as interlinked presentations of evidence that allow data to be tracked back to its origin in an objectively verifiable way. APCs are implemented through:
Directed Acyclic Graph (DAG) Structure
ACDCs form directed acyclic graphs where:
This structure enables:
Proof-of-Authorship vs. Proof-of-Authority
KERI distinguishes two types of provenance:
Example: An author (Terlalu Bonito) creates a book with an ACDC containing:
When rights are sold to Liz Smiley:
This separation enables delegation trees where authority can be transferred while maintaining verifiable authorship provenance.
KERI implements end-to-end provenance through:
Data Flow Transformations
Every data transformation must be provenanced using verifiable data items:
This creates verifiable data supply chains where:
Decentralized Autonomic Data (DAD)
The Decentralized Autonomic Data concept establishes that authentic data must be:
DAD items maintain provenance through:
KERI's provenance mechanisms support privacy-preserving disclosure:
Compact Disclosure
ACDCs can be presented with:
Provenance chains can include:
This enables contractually protected disclosure where provenance is verifiable but data usage is legally constrained.
Supply Chain Tracking
Physical supply chains can be digitally twinned through ACDC provenance:
Credential Ecosystems
The vLEI (verifiable Legal Entity Identifier) ecosystem demonstrates provenance in practice:
Each credential's provenance is verifiable back to GLEIF through the ACDC chain.
Data Transformation Pipelines
In analytics and IoT applications:
Cryptographic Verifiability
Portability
Scalability
Privacy Protection
Complexity
Storage Requirements
Governance Challenges
Veracity vs. Provenance
KERI provides secure attribution (who said what) but not veracity (whether claims are true):
Provenance in KERI represents a fundamental shift from trust-based to verification-based data lineage. By combining cryptographic key management (KELs) with chained data containers (ACDCs), KERI enables end-to-end verifiable provenance without requiring trusted intermediaries. This approach supports the vision of an authentic web where all data maintains cryptographically verifiable provenance from origin through all transformations, enabling trust at internet scale through mathematical proof rather than institutional authority.
Provenance Graph Design
Disclosure Strategies
Governance Frameworks
Verification Infrastructure