Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 97 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
The property of an identifier or digital asset that enables control authority to be transferred from one controller to another in an unobstructed, loss-less manner through cryptographic key rotation, maintaining identifier continuity while changing the controlling keys.
Transferability is a fundamental property in digital identity systems that determines whether control over an identifier can be transferred between parties or rotated to new cryptographic keys while maintaining the identifier's continuity. In the context of KERI, transferability specifically refers to the capability of an Autonomic Identifier (AID) to support key rotation through pre-rotation mechanisms, enabling persistent control despite key compromise or the need to change controlling parties.
The concept encompasses several key properties:
Transferability stands in direct contrast to non-transferable identifiers, which have fixed, non-rotatable keys and are inherently ephemeral. The distinction between transferable and non-transferable identifiers is architectural—it determines whether an identifier is designed for persistent, long-term use with evolving security requirements, or for short-lived, single-purpose scenarios.
Implementing transferable identifiers requires careful attention to key lifecycle management:
Pre-Rotated Key Security: The next rotation keys must be generated and stored with higher security than current signing keys, as they represent the ultimate recovery mechanism. Consider using:
Key Rotation Policies: Establish clear policies for when rotation should occur:
Storage and Distribution: The KEL for transferable identifiers must be:
Witness Coordination: Transferable identifiers require witness infrastructure:
Key State Computation: Validators must "walk the KEL" to determine current key state:
Rotation Validation: Each rotation event must be validated:
When using transferable identifiers in delegation trees:
Traditional identifier systems have struggled with the transferability problem in different ways:
Administrative Systems (DNS, Certificate Authorities): These systems achieve transferability through centralized administrative processes. Domain names can be transferred between owners through registrar procedures, and SSL certificates can be reissued to new key pairs. However, this transferability depends entirely on the administrative authority's cooperation and introduces single points of failure.
Blockchain-Based Systems: Distributed ledger technologies attempted to solve transferability through on-chain transactions. Cryptocurrency addresses demonstrate non-transferable identifiers (once a private key is compromised, the address must be abandoned), while some blockchain identity systems implement transferability through smart contracts that update key-to-identifier mappings. However, this approach locks identifiers to specific ledgers and requires on-chain transactions for every key rotation.
Self-Certifying Identifiers (Basic): Early self-certifying identifier designs, where the identifier is derived directly from a public key, are inherently non-transferable. The identifier is cryptographically bound to a single key pair—if that key is compromised, the identifier must be abandoned entirely. This limitation made basic self-certifying identifiers unsuitable for long-term persistent identity.
The fundamental challenge has been achieving transferability while maintaining:
KERI solves the transferability problem through its innovative pre-rotation mechanism combined with the Key Event Log (KEL) architecture. This approach enables what KERI terms transferable identifiers—identifiers that maintain cryptographic self-certification while supporting secure key rotation.
The core innovation enabling transferability in KERI is pre-rotation. Each establishment event (inception or rotation) includes a cryptographic commitment to the next set of rotation keys through their digests. This creates a forward-chained structure where:
This separation of signing authority from rotation authority provides several critical properties:
The KEL provides the verifiable data structure that makes transferability auditable and end-verifiable:
This architecture enables transferable identifiers that maintain continuity across key rotations. The identifier prefix remains constant while the authoritative key set evolves, with each transition cryptographically provable through the KEL.
Unlike blockchain-based approaches, KERI's transferability does not require:
This makes KERI's transferable identifiers truly portable and self-sovereign—the identifier can be moved between different witness pools, watcher networks, or infrastructure providers while maintaining verifiable continuity of control.
KERI extends transferability through delegation, enabling hierarchical structures where:
This enables organizational structures where a root transferable identifier (e.g., a corporation's primary AID) delegates authority to departmental identifiers, which may further delegate to individual role identifiers, all while maintaining cryptographic verifiability of the delegation chain.
Transferable identifiers are essential for scenarios requiring:
Long-term Persistent Identity: Organizations, individuals, or systems that need stable identifiers over years or decades benefit from transferability. As cryptographic algorithms evolve, security requirements change, or operational needs shift, the identifier can be rotated to new keys while maintaining continuity.
Key Compromise Recovery: In production systems, key compromise is not a question of "if" but "when." Transferable identifiers enable recovery from compromise through rotation to pre-committed keys that were never exposed, avoiding the catastrophic loss of identifier continuity that occurs with non-transferable identifiers.
Organizational Identity: Legal entities, government agencies, and other organizations require identifiers that persist beyond individual employees or administrators. Transferable identifiers enable control to be rotated as personnel change, organizational structures evolve, or security policies are updated.
Cryptographic Agility: As quantum computing advances and new cryptographic algorithms emerge, transferable identifiers enable migration to stronger algorithms without abandoning existing identifiers and the trust relationships built around them.
The transferability property provides several concrete advantages:
Security Resilience: The ability to rotate keys provides defense-in-depth against key compromise. Even if current signing keys are exposed, rotation authority remains with unexposed pre-rotated keys.
Operational Flexibility: Organizations can change key management infrastructure, update security policies, or respond to new threats without disrupting identifier continuity.
Trust Continuity: Verifiable credentials, authorizations, and trust relationships established with an identifier persist across key rotations, avoiding the need to re-establish trust after security updates.
Infrastructure Independence: Transferable identifiers are not locked to specific ledgers, certificate authorities, or administrative systems, enabling true portability.
Complexity: Transferable identifiers require more sophisticated key management than non-transferable identifiers. Controllers must:
Storage Requirements: The KEL for a transferable identifier grows with each rotation event, requiring persistent storage and distribution infrastructure. Non-transferable identifiers have minimal storage requirements (just the inception event).
Governance Overhead: Organizations using transferable identifiers must establish policies for:
Performance Considerations: Verifying a transferable identifier requires processing the entire establishment event subsequence in the KEL to determine current key state. For identifiers with many rotations, this can be more computationally intensive than verifying non-transferable identifiers.
Despite the advantages of transferability, non-transferable identifiers remain valuable for specific use cases:
The choice between transferable and non-transferable identifiers is an architectural decision based on the identifier's intended lifecycle and security requirements.
Transferability is a fundamental property that determines whether an identifier can maintain continuity across key rotations and control transfers. KERI's approach to transferability through pre-rotation and KEL architecture provides a cryptographically verifiable, infrastructure-independent solution that enables persistent, secure identifiers without dependence on centralized authorities or distributed ledgers. This makes transferable identifiers essential for long-term organizational identity, key compromise recovery, and cryptographic agility in evolving security landscapes.
Transitioning from non-transferable to transferable identifiers: