Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 68 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Secure attribution is the cryptographic proof that a statement, message, or data originated from a specific controller, enabling verifiable answers to "whodunit?" in cyberspace through non-repudiable digital signatures and verifiable key state, independent of whether the content is true.
Secure attribution addresses the fundamental problem of proving authorship and authenticity of statements in digital systems. It answers the question "whodunit?!" in cyberspace by establishing cryptographically verifiable proof that a specific controller made a particular statement or claim.
The concept involves three essential components:
Secure attribution is fundamentally about proving who said something, not what was said or whether it is true. This distinction separates authenticity (verifiable origin) from veracity (truthfulness of content). A cryptographically signed statement proves the controller made that statement, but does not prove the statement's factual accuracy.
While KERI provides cryptographic secure attribution, organizations must establish governance frameworks to:
Implementers should consider:
Secure attribution depends on proper key management:
Balance secure attribution with privacy requirements:
Design verification systems that:
Secure attribution operates at the identity and authentication layer, providing the foundation upon which trust frameworks, governance, and veracity determination can be built. It does not:
The original Internet Protocol (IP) was designed without a security layer, as documented in RFC 0791. The IP packet header includes a source address field that can be undetectably forged by any intermediary, meaning recipients cannot reliably determine if packets originated from imposters. This architectural deficiency means all secure attribution mechanisms must be overlaid on existing Internet infrastructure.
Traditional approaches to secure attribution have relied on:
These systems create platform-locked trust where identity verification only works within specific domains, fragmenting the internet's trust landscape.
Historically, attribution has been a "non-exact science" achieving confidence levels of "beyond a reasonable doubt" rather than cryptographic certainty. The challenge involves:
KERI solves secure attribution through a cryptographic rather than administrative root-of-trust. This fundamental shift means trust does not rely on any trusted third-party administrative process but instead uses cryptographically verifiable data structures.
Self-Certifying Identifiers (SCIDs) form the foundation:
Autonomic Identifiers (AIDs) extend SCIDs with:
KERI's Key Event Logs provide the verifiable data structure for secure attribution:
KERI enables end-verifiable attribution where:
This creates zero-trust architecture where "it's much easier to protect one's private keys than to protect everyone else's internet infrastructure."
KERI's distributed infrastructure enhances secure attribution:
Witnesses: Controller-designated entities that:
Watchers: Validator-selected entities that:
KERI explicitly separates secure attribution from veracity determination:
This architectural choice enables KERI to remain protocol-neutral while supporting diverse governance frameworks and trust models.
Verifiable Credentials: KERI provides the secure attribution foundation for credential systems like ACDCs (Authentic Chained Data Containers), enabling:
Supply Chain Provenance: Secure attribution enables authentic data supply chains:
Legal Entity Identification: GLEIF's vLEI (verifiable Legal Entity Identifier) implementation demonstrates:
Secure Communications: Trust Spanning Protocol (TSP) applications:
Cryptographic Certainty: Moves from "beyond reasonable doubt" to cryptographic proof of attribution, eliminating ambiguity about statement origins.
Portability: Identifiers and their attribution proofs are not locked to specific platforms, enabling true self-sovereignty and cross-platform interoperability.
Scalability: No global consensus required—each identifier has its own KEL, enabling linear scaling without distributed consensus overhead.
Post-Quantum Security: Pre-rotation mechanisms using cryptographic digests provide protection against quantum computing attacks on key material.
Duplicity Detection: Makes malicious behavior evident rather than hidden, enabling accountability and trust assessment.
Infrastructure Independence: Verification doesn't depend on the security of intervening infrastructure, enabling zero-trust architectures.
PAC Theorem Constraints: The PAC (Privacy, Authenticity, Confidentiality) theorem establishes that systems can achieve any two of these three properties at the highest level, but not all three simultaneously. KERI prioritizes:
This means some privacy features must be sacrificed to maintain strong authenticity guarantees.
Key Management Responsibility: Controllers bear full responsibility for protecting private keys. While KERI provides mechanisms like pre-rotation for recovery, initial key compromise before rotation remains a vulnerability.
Complexity: Achieving secure attribution requires understanding cryptographic primitives, key event logs, witness coordination, and duplicity detection—creating a learning curve for implementers.
Governance Requirements: Secure attribution alone doesn't establish trust—organizations must build governance frameworks on top of KERI to assess veracity and reputation.
Metadata Visibility: While KERI enables privacy-preserving techniques, some metadata about identifier usage may be observable, requiring careful design to prevent correlation attacks.
Separation of Concerns: KERI's secure attribution layer is deliberately separated from:
This separation enables flexible trust models while maintaining a common cryptographic foundation.
Trust Spanning Layer: KERI functions as a horizontal spanning layer in the internet protocol stack, similar to IP itself, enabling trust to span across applications and platforms without requiring shared governance.
Autonomic Trust Basis: By using cryptographic proofs rather than administrative or algorithmic trust, KERI creates truly decentralized secure attribution that doesn't depend on blockchain consensus or certificate authorities.
Secure attribution through KERI represents a paradigm shift from administrative trust models to cryptographic certainty, providing the foundation for an "authentic web" where all data has verifiable proof-of-authorship.