Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 43 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Veracity is the quality of being true or accurate—the actual truthfulness of information content itself. In KERI/ACDC systems, veracity is explicitly distinguished from authenticity: KERI provides cryptographic proof of who made a statement (authenticity), but determining whether that statement is true (veracity) requires additional governance frameworks, reputation systems, and verification processes beyond the cryptographic layer.
Veracity refers to the quality of being true, accurate, or in accord with fact or reality. In the context of digital identity and trust systems, veracity represents the truthfulness of information content rather than merely its provenance or integrity.
The concept is fundamentally distinct from related but separate properties:
A critical insight is that information can possess all three of these properties—authenticity, integrity, and provenance—while still lacking veracity. The canonical example used throughout KERI documentation illustrates this: when a newspaper publishes a story about an event, every faithful reproduction of that story is authentic (verifiably from that newspaper), has integrity (complete and unaltered), and has provenance (documented chain of publication), but none of these properties guarantee the story is true (has veracity).
Veracity assessment operates at the semantic and factual layer of information systems, addressing questions like:
These questions require evaluation mechanisms beyond cryptographic primitives, including:
Separation of Concerns: System architects must clearly distinguish between:
Governance Framework Requirements: Organizations implementing KERI-based systems must establish:
User Education: End users must understand that:
Ecosystem Design: Credential ecosystems should:
vLEI Model: The GLEIF vLEI ecosystem demonstrates effective separation:
Layered Trust: Build trust architectures with:
Reputation Integration: Combine KERI authentication with:
The distinction between authenticity and veracity has deep roots in epistemology and information theory, but becomes particularly critical in decentralized identity systems where cryptographic mechanisms can prove origin without proving truth.
Historically, veracity assessment relied on:
These traditional models conflated authentication (proving who said something) with validation (proving what was said is true), often because the same trusted intermediaries performed both functions.
Early digital identity systems inherited this conflation. Public Key Infrastructure (PKI) systems using Certificate Authorities combined:
This bundling created systemic vulnerabilities—compromise of a CA could simultaneously break authentication and enable false claims to appear verified.
KERI (Key Event Receipt Infrastructure) makes a fundamental architectural decision to separate cryptographic authentication from veracity determination. This separation of concerns is not a limitation but a deliberate design choice that enables more robust trust architectures.
KERI's core contribution is secure attribution—cryptographically proving who made a statement through:
As stated in the Universal Identifier Theory: "KERI offers cryptographic root-of-trust to establish attributional trust. In the real world you'd also need reputational trust. You can't have reputation without attributional trust."
KERI explicitly does not determine whether statements are true. The source of truth documentation emphasizes: "KERI and ACDC commit to secure attribution but do not determine whether what was said is true."
This design choice means:
While KERI doesn't determine veracity, it provides critical infrastructure that enables veracity assessment:
Veracity determination in KERI-based systems requires a governance layer that includes:
Trust Frameworks: Policies defining:
Credential Schemas: JSON Schema definitions in ACDCs that:
Reputation Systems: Mechanisms for:
Verification Processes: Procedures for:
Legal Entity Verification (vLEI):
The GLEIF vLEI (verifiable Legal Entity Identifier) ecosystem demonstrates the separation of authenticity and veracity:
The vLEI governance framework establishes:
Supply Chain Provenance:
In supply chain applications:
Academic Credentials:
For educational credentials:
Separating authentication from veracity provides several advantages:
Architectural Clarity: Clear separation of concerns enables:
Flexibility: Different trust models can be built on the same foundation:
Scalability: Cryptographic operations scale independently from:
Portability: Credentials can move between trust contexts:
Complexity: Users must understand:
Responsibility: Verifiers bear responsibility for:
Governance Requirements: Ecosystems must establish:
No Automatic Trust: Unlike traditional PKI where CA validation implied trustworthiness, KERI requires explicit veracity evaluation at the application layer.
The authenticity documentation introduces a critical trade-space involving three security properties:
The trilemma states that systems can achieve any two of the three properties at the highest level, but not all three simultaneously. KERI's design prioritizes:
Veracity is notably absent from this trilemma because it operates at a different architectural layer—it's not a cryptographic property but a semantic and governance property that builds upon the foundation of authenticity.
Veracity intersects with several related concepts in distinct ways:
Authenticity: Provides the foundation for veracity assessment by establishing who made claims, but does not validate claim truthfulness.
Integrity: Ensures information is complete and unaltered, but complete false information can have perfect integrity.
Provenance: Documents the history and chain of custody, but documented false information maintains provenance.
Source of Truth: KERI provides secure attribution (who said it) but not source of truth determination (is it true).
Reputation: Historical patterns of veracity contribute to reputation, which in turn informs future veracity assessments.
Identity Assurance: The process by which trusted parties establish veracity of identity claims, complementing KERI's authentication.
Veracity represents the semantic truth layer that must be built atop KERI's cryptographic authentication layer. This architectural separation is not a weakness but a strength—it enables flexible, context-appropriate trust models while maintaining a secure, universal foundation for attribution.
KERI's explicit non-commitment to veracity determination reflects a mature understanding that:
By providing robust secure attribution, KERI creates the necessary foundation for veracity assessment without constraining how that assessment occurs, enabling diverse trust ecosystems to flourish on a common cryptographic infrastructure.