Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 187 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
An SSI (Self-Sovereign Identity) system is a decentralized identity infrastructure that enables autonomous parties to negotiate and execute electronic transactions by providing, requesting, and obtaining verifiable data without relying on centralized identity providers or intermediaries.
A Self-Sovereign Identity (SSI) system represents a paradigm shift in digital identity architecture, moving away from centralized identity providers toward user-controlled, cryptographically verifiable identity systems. The SSI Infrastructure consists of technological components deployed globally that support the sustainable functionality of parties by providing IT services and facilities necessary for electronic transactions to be negotiated and executed.
The core principle of SSI is user sovereignty: individuals and organizations maintain direct control over their identifiers and credentials without ceding authority to centralized service providers. This autonomy extends beyond mere data custody to encompass the fundamental ability to create, manage, and present identity information independently.
Key properties of SSI systems include:
The scope of SSI systems encompasses the entire lifecycle of digital identity: creation of identifiers, issuance of credentials, presentation of claims, verification of proofs, and revocation of credentials. SSI systems provide the infrastructure for these operations without requiring centralized coordination or permission from authorities.
The concept of self-sovereign identity was formally articulated by Christopher Allen in his influential 2016 blog post "The Path to Self-Sovereign Identity," which proposed ten foundational principles. However, Allen explicitly positioned these principles as "a departure point to provoke a discussion" rather than a definitive standard, acknowledging that SSI lacks universal consensus on its precise definition.
Implementing SSI systems requires careful attention to several architectural layers:
Identity Layer: The foundation includes identifier generation, key management, and key event logging. KERI provides this through AIDs and KELs.
Credential Layer: Built on the identity layer, this includes credential schemas, issuance protocols, presentation mechanisms, and verification procedures. ACDC and IPEX provide these capabilities in KERI.
Governance Layer: Ecosystem rules, trust frameworks, and schema registries operate at this layer. The vLEI Ecosystem Governance Framework demonstrates how governance can be structured.
KERI-based SSI systems prioritize specific security properties:
SSI systems can be deployed in several patterns:
Direct Mode: Controllers and validators communicate directly without witnesses, suitable for peer-to-peer scenarios with reliable connectivity.
Indirect Mode: Witnesses provide key event receipts, enabling asynchronous operation and duplicity detection for validators that cannot maintain direct connections.
Hybrid Mode: Combines direct and indirect modes, using witnesses for some identifiers while maintaining direct connections for others.
Achieving interoperability across SSI implementations requires:
Traditionally, digital identity has operated through three models:
The evolution toward SSI was driven by several factors:
Early SSI implementations focused on blockchain-based identity systems, using distributed ledgers as decentralized registries for identifiers and credentials. However, these approaches faced challenges with scalability, privacy (public blockchains expose transaction patterns), and the requirement for global consensus on all identity operations.
KERI (Key Event Receipt Infrastructure) represents a specific architectural approach within the broader SSI landscape, distinguished by its security-first design philosophy. The KERI development team explicitly prioritizes:
This ordering reflects a deliberate architectural choice that security properties must be established at the foundational level before addressing higher-level privacy concerns. KERI positions itself as a "rather small subset" of all available SSI systems, focusing on doing specific things exceptionally well rather than attempting to be a universal SSI solution.
KERI's approach differs from other SSI systems in several fundamental ways:
Autonomic Identifiers (AIDs): KERI uses self-certifying identifiers that are cryptographically bound to key pairs through derivation codes. Unlike DIDs that may rely on external resolution infrastructure, AIDs are verifiable through the identifier itself and its associated Key Event Log (KEL).
Key Event Logs: Instead of storing identity state on blockchains or distributed ledgers, KERI maintains append-only logs of key events for each identifier. These logs are end-verifiable, meaning anyone can cryptographically verify the entire history without trusting intermediaries.
Witness Networks: Rather than requiring global consensus, KERI uses designated witnesses that provide receipts for key events. This enables scalability while maintaining security through duplicity detection rather than preventing duplicity through consensus.
Pre-rotation: KERI's key management includes cryptographic commitments to future rotation keys, providing post-quantum security and enabling recovery from key compromise without requiring trusted third parties.
Decoupled from Ledgers: While KERI can use ledgers as backers, it does not depend on them. Identifiers can be transferred off ledgers, providing true portability and avoiding blockchain-specific limitations.
KERI's security-first approach manifests in several ways:
This model enables attributional trust - proving "who said what" through cryptographic signatures - as the foundation upon which other trust types can be built.
The SSI system architecture, and KERI's specific implementation, has significant practical implications:
Organizational Identity: The vLEI (verifiable Legal Entity Identifier) ecosystem demonstrates SSI for organizational identity, enabling legal entities to issue cryptographically verifiable credentials about their structure, authorized representatives, and roles. This provides a trust layer for business-to-business interactions without requiring centralized identity providers.
Credential Ecosystems: SSI systems enable credential issuance, presentation, and verification without centralized registries. Issuers can create credentials, holders can store and selectively disclose them, and verifiers can validate them independently.
Supply Chain Provenance: Authentic data supply chains use SSI principles to track provenance of goods and data through verifiable chains of custody, with each participant maintaining sovereign control over their identifiers.
Cross-Border Identity: SSI systems enable identity portability across jurisdictions without requiring international agreements on centralized identity providers, as cryptographic verification works universally.
User Control: Individuals and organizations maintain direct control over their identifiers and credentials, deciding what to disclose and to whom.
Privacy by Design: Selective disclosure mechanisms enable sharing only necessary information, minimizing data exposure and correlation risks.
Reduced Infrastructure Costs: Eliminating centralized identity providers reduces operational costs and removes single points of failure.
Interoperability: Cryptographic standards enable different implementations to work together without requiring business agreements between providers.
Resilience: Decentralized architecture provides resilience against outages, censorship, and attacks on centralized infrastructure.
KERI's security-first approach involves deliberate trade-offs:
Complexity: Cryptographic verification and key management require more sophisticated implementations than simple username/password systems.
User Responsibility: Self-sovereign identity places key management responsibility on users, requiring secure key storage and backup mechanisms.
Privacy Limitations: The security-first approach means some privacy features may be layered on top rather than built into the foundation, accepting that perfect security, confidentiality, and privacy cannot be achieved simultaneously (the PAC Theorem).
Adoption Barriers: Moving from familiar centralized systems to decentralized architectures requires education and tooling to make SSI accessible to non-technical users.
Ecosystem Coordination: While SSI eliminates centralized control, it requires coordination on standards, schemas, and governance frameworks to enable interoperability.
Building SSI systems requires addressing several practical challenges:
Key Management: Secure generation, storage, and rotation of cryptographic keys is fundamental. KERI's pre-rotation mechanism provides a path for key recovery, but implementations must still protect current keys.
Witness Infrastructure: KERI-based systems require witness networks for indirect mode operation. Deploying and maintaining witnesses involves operational considerations around availability, performance, and trust.
Credential Schemas: Interoperable credential ecosystems require shared schemas. The vLEI ecosystem demonstrates governance frameworks for schema management and versioning.
User Experience: Making cryptographic operations transparent to users while maintaining security requires careful UX design. Wallets, agents, and other tools must balance usability with security.
Governance: While SSI systems are decentralized, they still require governance for schemas, trust frameworks, and ecosystem rules. The vLEI Ecosystem Governance Framework demonstrates how governance can be layered on decentralized infrastructure.
The SSI system concept represents a fundamental rethinking of digital identity, moving from institutional trust to cryptographic verification. KERI's implementation demonstrates how security-first design can provide the foundation for scalable, verifiable identity systems that enable true user sovereignty while maintaining the verifiability and interoperability necessary for practical deployment.