Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 195 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
In KERI, verifiable refers to a Key Event Log (KEL) that is internally consistent through cryptographic digest chains and authenticated through non-repudiable signatures, enabling any party to independently verify the log's integrity and authenticity without relying on trusted intermediaries.
Verifiable in the KERI protocol context describes a specific property of data structures—particularly Key Event Logs (KELs)—that enables independent cryptographic validation of both internal consistency and authenticity. A verifiable KEL satisfies two fundamental requirements:
Internal Consistency: The log maintains integrity through backward and forward chaining digests, where each event cryptographically links to its predecessor and commits to future key states through pre-rotation mechanisms.
Authenticity: All events are signed with non-repudiable digital signatures from the controlling keypairs, proving that the controller authorized each event.
The critical property is that verification requires only the KEL itself and cryptographic primitives—no external trust anchors, certificate authorities, or trusted intermediaries are necessary. This enables what KERI terms end-verifiability: any party receiving a KEL can independently validate its complete history from inception through all rotations to the current key state.
Traditional identity systems rely on administrative verification through trusted third parties:
Event Ordering: KEL verification must process events in strict sequence order. Out-of-order processing can lead to incorrect key state determination and failed signature validation.
Threshold Calculations: For multi-signature AIDs, implement proper threshold logic:
ceil(2/3 * num_keys)kt) and next threshold (nt) must be trackedDigest Algorithm Selection: The derivation code in CESR-encoded digests specifies the hash algorithm. Verifiers must support all algorithms used in the KEL (commonly Blake3-256, Blake2b-256, SHA-256).
Witness Receipt Validation: When verifying KERLs (KELs with witness receipts):
Delegation Chain Verification: For delegated identifiers:
Performance Optimization: For long KELs:
Error Handling: Verification failures should provide specific error information:
Security Considerations:
These approaches share a common limitation: verification requires trusting external infrastructure. If the CA is compromised, certificates become unreliable. If blockchain validators collude, consensus fails. If identity providers are unavailable, verification cannot occur.
The concept of cryptographic verifiability emerged from research into self-certifying identifiers and verifiable data structures, where mathematical proofs replace institutional trust. However, early self-certifying systems lacked key rotation capabilities, making them ephemeral and unsuitable for persistent identifiers.
KERI achieves verifiability through a novel architecture that combines several cryptographic primitives:
Each event in a KEL includes:
This creates a tamper-evident chain where any modification to historical events breaks the cryptographic links, making alterations immediately detectable. The forward chaining through pre-rotation commitments enables secure key rotation while maintaining verifiability—a critical innovation that distinguishes KERI from basic self-certifying identifiers.
Every event must be signed by the current authoritative keypairs. Because the KEL itself establishes which keys were authoritative at each point in time, verifiers can:
The signatures are non-repudiable: the controller cannot later deny having created signed events, providing strong accountability.
KERI specifies exact verification procedures in its protocol specification. A KEL is verifiable when:
This protocol-level specification ensures that "verifiable" has precise, testable meaning rather than being a vague security claim.
KERI's verifiability is ambient: anyone, anywhere, at any time can verify a KEL. This property emerges from:
This ambient verifiability enables truly decentralized trust, as verification doesn't depend on the availability or honesty of any particular infrastructure.
A unique aspect of KERI's verifiability is duplicity evidence: if a controller creates conflicting versions of their KEL (e.g., two different rotation events at the same sequence number), possession of both versions provides cryptographic proof of misbehavior. This makes duplicity evident rather than merely detectable, enabling strong accountability mechanisms.
Decentralized Credential Verification: ACDC credentials can be verified by checking:
All verification occurs without contacting the issuer or any centralized registry.
Offline Identity Verification: Mobile devices can verify identities in environments without network connectivity, as KELs contain all information needed for verification. This enables use cases like:
Supply Chain Provenance: Each participant's KEL provides verifiable proof of their identity and key state, enabling end-to-end verification of supply chain events without trusting intermediary databases.
Zero-Trust Architecture: Verifiers don't need to trust:
Portability: KELs can be moved between systems, stored in different formats, and transmitted through various channels while remaining verifiable. The verification property is intrinsic to the data structure, not dependent on where it's stored.
Auditability: Complete event history enables forensic analysis. If disputes arise, the KEL provides an immutable audit trail of all key management operations.
Scalability: Verification is computationally efficient (signature checks and hash computations) and parallelizable. Unlike blockchain systems requiring global consensus, KERI verification scales linearly with the number of identifiers.
Verification Complexity: While conceptually simple, implementing correct verification requires:
Storage Requirements: KELs must be retained for verification. While compact compared to blockchains, long-lived identifiers with many rotations accumulate event history. However, KERL compression techniques can mitigate this.
Duplicity Detection Latency: While duplicity is eventually evident, detection requires comparing KEL versions. In direct mode, this may not occur until validators compare notes. Watchers and witnesses help detect duplicity more quickly.
Key Management Burden: Verifiability depends on proper key management by controllers. If private keys are compromised before rotation, attackers can create verifiable but unauthorized events. KERI's pre-rotation mechanism mitigates this by enabling recovery, but controllers must protect pre-rotated keys.
KERI distinguishes verification (cryptographic validation of signatures and structure) from validation (policy-based assessment of whether to trust the identifier). A KEL may be perfectly verifiable but still untrusted if:
Verifiability provides the cryptographic foundation; validation adds business logic and policy enforcement. This separation enables flexible trust frameworks built on a common verifiable infrastructure.