Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 18 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Unpermissioned correlation occurs when a disclosee (credential recipient) establishes linkages between two or more disclosed ACDCs without the discloser's authorization, enabling tracking or profiling that violates the discloser's privacy expectations and intended disclosure boundaries.
Unpermissioned correlation represents a fundamental privacy violation in verifiable credential systems where a recipient of disclosed credentials (the disclosee) creates associations between multiple ACDC presentations that the credential provider (the discloser) did not authorize or intend. This concept addresses the critical challenge of maintaining privacy boundaries in credential ecosystems where the same entity may present different credentials to the same verifier across multiple interactions.
The core properties of unpermissioned correlation include:
Unpermissioned correlation differs from legitimate correlation scenarios where:
The scope of unpermissioned correlation extends beyond simple identifier reuse to include any mechanism by which a verifier can associate multiple credential presentations to the same subject without authorization, including:
Preventing unpermissioned correlation requires ecosystem-level governance:
Contractual frameworks: Establish clear terms for permissioned vs. unpermissioned correlation in credential presentation agreements. ACDC's rules section should specify:
Issuer responsibilities: Credential issuers should:
Verifier obligations: Credential verifiers should:
Holder awareness: Credential holders should:
Credential design: Structure ACDCs to support graduated disclosure:
Presentation protocols: Implement presentation flows that minimize correlation:
Verification systems: Build verifiers that respect correlation boundaries:
The concept of unpermissioned correlation emerged from decades of privacy research in digital identity systems, building on foundational work in:
Anonymous credentials research (1980s-1990s): Early cryptographic protocols like David Chaum's blind signatures demonstrated that credential systems could provide unlinkability between credential issuance and presentation. However, these systems often failed to address correlation risks that arose from:
Privacy-enhancing technologies (2000s): As digital identity systems proliferated, researchers identified multiple correlation vectors:
Verifiable credentials evolution (2010s): The W3C Verifiable Credentials specification acknowledged correlation risks but provided limited technical mechanisms to prevent them. Traditional approaches included:
However, these approaches often failed to address contextual linkability - the condition where verifiers provide enough context at the point of capture to enable statistical correlation with existing datasets, even when the credentials themselves use privacy-preserving techniques.
KERI and ACDC address unpermissioned correlation through a comprehensive architectural approach that combines cryptographic primitives, protocol design, and governance frameworks:
ACDCs implement graduated disclosure mechanisms that enable progressive revelation of information based on contractual agreements:
Compact disclosure: Initial presentations reveal only SAID commitments rather than full content, minimizing information leakage while maintaining cryptographic verifiability
Partial disclosure: Selected sections of ACDCs are expanded while others remain as SAIDs, enabling context-specific revelation without exposing the complete credential graph
Selective disclosure: Individual attributes within ACDCs can be independently disclosed using cryptographic commitments, preventing correlation between disclosed and undisclosed attributes within the same credential
Full disclosure: Complete credential details are revealed only after contractual protections are established
Private ACDCs incorporate high-entropy UUID fields (≥128 bits) that function as salty nonces, making the SAID of the ACDC resistant to rainbow table attacks. This prevents verifiers from:
The UUID field transforms each ACDC into a unique cryptographic commitment that cannot be correlated without access to the full credential content, even if the schema and attribute structure are publicly known.
ACDCs integrate chain-link confidentiality mechanisms that establish legal frameworks governing correlation:
This approach recognizes that technical mechanisms alone cannot prevent all correlation - legal frameworks provide complementary protection by establishing consequences for unauthorized correlation activities.
KERI's AID (Autonomic Identifier) system enables:
Unlike traditional DID systems that often rely on persistent identifiers anchored to blockchains (creating permanent correlation vectors), KERI AIDs can be created and managed without any ledger registration, eliminating a major source of unpermissioned correlation.
Healthcare credentials: A patient presenting medical credentials to different providers should not enable those providers to correlate the presentations and build a comprehensive medical history without the patient's explicit consent. ACDC's graduated disclosure enables:
Financial services: A business presenting different financial credentials (credit rating, bank account verification, tax status) to various service providers should control whether those presentations can be correlated. Private ACDCs with UUIDs prevent:
Supply chain verification: Manufacturers presenting product authenticity credentials to distributors, retailers, and consumers should control correlation to prevent:
Employment verification: Job applicants presenting credentials to multiple employers should prevent:
Verification efficiency vs. privacy: Preventing correlation often requires:
This creates tension between user experience (simple, fast verification) and privacy protection (correlation resistance).
Contextual information leakage: Even with perfect cryptographic unlinkability, correlation may occur through:
ACDC's contractual protections address these vectors by establishing legal obligations, but technical enforcement remains challenging.
Legitimate correlation needs: Some scenarios require authorized correlation:
ACDC's graduated disclosure enables these scenarios through explicit contractual agreements, but distinguishing legitimate from unpermissioned correlation requires governance frameworks beyond the protocol itself.
Ecosystem coordination: Preventing unpermissioned correlation requires:
The technical architecture provides tools, but ecosystem adoption determines effectiveness.
Unpermissioned correlation intersects with several related privacy concepts:
Contextual linkability: The condition where sufficient context enables correlation even with privacy-preserving credentials. ACDC addresses this through contractual protections that govern context collection and use.
Correlation: The general concept of establishing relationships between data elements. Unpermissioned correlation specifically addresses unauthorized instances.
Privacy: The broader ability to control information disclosure. Unpermissioned correlation represents a specific privacy violation where disclosure control is circumvented through unauthorized association.
The ACDC specification recognizes that preventing unpermissioned correlation requires a defense-in-depth approach combining:
This comprehensive approach acknowledges that no single technical mechanism can prevent all correlation - effective privacy protection requires coordinated technical, legal, and social measures.