Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 74 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A verifiable data registry (VDR) is a system that mediates the issuance and verification of ACDCs (Authentic Chained Data Containers) by maintaining cryptographically verifiable records of credential state, typically implemented as Transaction Event Logs (TELs) anchored to KERI Key Event Logs (KELs).
A verifiable data registry (VDR) is a verifiable data structure that serves as an authoritative source for tracking the lifecycle state of credentials and other verifiable data within the KERI/ACDC ecosystem. As defined in the canonical glossary, a VDR is "a system that mediates the issuance and verification of ACDCs" and more broadly "a role a system might perform by mediating issuance and verification of ACDCs."
The foundational definition establishes that a VDR is a verifiable data structure containing actual content in one of two forms:
This dual-mode architecture enables VDRs to provide verifiable proof of credential state (issued, revoked, transferred) without necessarily storing complete credential content, supporting both transparency and efficiency in verifiable credential systems.
The KERI VDR concept aligns with the W3C Verifiable Credentials Data Model 2.0 definition, which describes VDRs as systems that facilitate:
VDRs in KERI use a two-tier TEL structure rather than a single monolithic registry:
Management TEL (vcp inception event):
vrt (verifiable data registry rotation) events for registrar updatesVC TEL (per-credential):
iss (issuance), rev (revocation), and bis/brv (backed issuance/revocation) eventsTEL events are not directly signed. Instead:
This design enables credential verification even after key rotation, as the TEL anchoring is cryptographically bound to the KEL's verifiable key state history.
Registry identifiers (ri field in ACDCs) enable discovery through:
did:keri and did:webs identifiersThe W3C specification uses inclusive "and/or" language to indicate that different VDR implementations may provide different subsets of these capabilities. Importantly, the W3C definition explicitly extends beyond DIDs: "a verifiable data registry might also be used for other cryptographically-verifiable data structures such as verifiable credentials."
In KERI, VDRs are implemented as Transaction Event Logs (TELs) - hash-linked data structures of transactions that track state anchored to a Key Event Log (KEL). This architecture provides several critical properties:
Cryptographic verifiability: All state changes are cryptographically bound to the controlling KEL through anchoring seals. As the PTEL specification states: "A KERI KEL controls a TEL" through a specific anchoring mechanism:
Duplicity evident: Conflicting registry states can be detected through KERI's duplicity detection mechanisms inherited from the KEL layer. Any attempt to create conflicting TEL states anchored to the same KEL will be detectable by validators.
Anchored trust: Registry events inherit the security properties of KERI identifiers through cryptographic seals. Notably, TEL events themselves do not require signatures - the commitment is established through the signed KEL event that includes the TEL event digest as a seal.
KERI employs a sophisticated two-tier TEL structure for credential lifecycle management:
The management TEL (also called management-TEL or MANAGEMENT-TEL) provides the registry foundation by:
The management TEL creates the authoritative structure that individual credential TELs reference for their operational backing and governance context.
The VC TEL (virtual credential transaction event log, also VCTEL or vctel) operates at the individual credential level to:
This separation of concerns enables scalable credential management where the management layer handles infrastructure governance while individual VC TELs handle credential-specific state transitions.
The KERI protocol defines specific operation codes for VDR lifecycle management:
vcp (VDR inception): Stands for "vdr incept" or "verifiable data registry inception." This operation type initializes a new VDR instance, establishing its unique identifier and initial configuration.
vrt (VDR rotation): Stands for "vdr rotate" or "verifiable data registry rotation." This operation enables rotation of control over the registry, analogous to key rotation in KELs but applied to the registry governance layer.
These operation codes are part of KERI's message type nomenclature using CESR encoding, where short codes identify specific protocol operations within event streams.
VDR events utilize CESR (Composable Event Streaming Representation) encoding throughout the KERI infrastructure. CESR provides:
Text-binary duality: Events can be represented in both human-readable Base64 text and compact binary formats with bidirectional conversion without loss.
Self-framing: Each primitive (cryptographic value) includes derivation codes that specify its type and length, enabling stream parsers to extract atomic elements without parsing entire messages.
Composability: Multiple primitives, groups, and nested structures can be concatenated and processed as unified streams, critical for efficient VDR query/response patterns.
The CESR encoding for VDR events follows the same patterns as KEL events, with version strings (e.g., "KERI10JSON"), event type codes, and cryptographic attachments all using CESR primitives.
The cryptographic binding between KELs and TELs uses event source seals - a specific seal type that commits to external events. The anchoring process works as follows:
ixn or rotation event rot)This architecture means the security of the TEL is directly inherited from the KEL - any compromise of TEL integrity requires compromising the controlling KEL, which benefits from KERI's key pre-rotation and witness consensus mechanisms.
Registrars serve as the witnessing/backing infrastructure for TELs, analogous to witnesses in KEL architecture. Key distinctions:
Witness vs Registrar roles:
Rotation and governance: The management TEL can rotate its Registrar list through specific events, enabling dynamic infrastructure management without disrupting individual credential TELs.
Threshold configuration: Like witness thresholds, Registrar configurations support threshold requirements where a minimum number of Registrars must confirm TEL state for it to be considered authoritative.
The vLEI Ecosystem Governance Framework documents detail multiple discovery mechanisms for VDR endpoints:
OOBI provides the primary discovery mechanism, associating AIDs with URLs where VDR data can be accessed. For VDRs, OOBIs enable:
The governance framework specifies well-known URI patterns for standardized VDR endpoint discovery, enabling automated location of registry services without prior configuration.
The framework references DHT-based discovery as a supplementary mechanism, leveraging distributed key-value storage for decentralized VDR endpoint resolution. This approach supports the "percolated discovery" model where endpoint information propagates through the network.
For did:keri and did:webs identifiers, DID resolution provides an alternative discovery path where the DID document can include service endpoints pointing to VDR query interfaces.
The source documents reveal that GLEIF vLEI credentials represent a primary and extensively-documented use case for KERI VDRs:
The Qualified vLEI Issuer (QVI) framework establishes rigorous VDR requirements:
Registry inception: QVIs must establish VDRs for tracking Legal Entity vLEI Credentials, OOR vLEI Credentials, and ECR vLEI Credentials.
Registrar requirements: The governance framework mandates minimum pools of 5 Registrars with mathematical consensus requirements using KERI's Agreement Algorithm for witness/Registrar consensus.
Access control: Registrars must maintain access control independence from controller keys to prevent poisoning attacks where a compromised controller could manipulate registry state.
The vLEI Trust Assurance Framework maps VDR requirements across four pillars:
The GLEIF External Delegated AID (GEDA) architecture demonstrates VDR delegation patterns:
The PTEL specification includes a critical scope limitation: "This document addresses public VCs only. The use of hash digests of VC contents as identifiers allows for correlation of VC uses, making this design unsuitable for private credential use cases."
Public VDRs using credential content digests as identifiers enable:
This makes public VDRs appropriate for:
For privacy-preserving use cases, the glossary references blinded revocation registries:
Salty nonce blinding factors: The current state of a TEL may be hidden/blinded such that the only way for a verifier to observe state is when the controller of a designated AID discloses it at presentation time.
Selective state disclosure: The holder controls what registry state information is revealed, enabling:
The salty nonce blinding factor mechanism uses random salts to blind TEL state, allowing credential holders to prove current validity without exposing correlation identifiers.
KERI VDRs represent a fundamental architectural shift from traditional credential registry models:
Blockchain/DLT approach:
KERI VDR approach:
Traditional PKI/CA model:
KERI VDR model:
Status List approach:
KERI TEL approach:
The VDR lifecycle follows specific patterns documented across the sources:
Management TEL creation:
VC TEL creation:
State transition process:
Registrar set changes:
KERI VDRs provide end-to-end verifiability where validators can cryptographically verify registry state without trusting intermediaries:
The duplicity evident property extends from KELs to VDRs:
KEL duplicity: Any attempt to create conflicting KEL branches (fork attack) is detectable by witnesses and validators
TEL duplicity: Since TEL events are anchored to KEL events via seals, any conflicting TEL states would require conflicting KEL events, triggering KEL-level duplicity detection
First-seen policy: The first-seen principle applies - witnesses/Registrars log the first version of each event they observe, making later conflicting events provably duplicitous
VDRs inherit KEL pre-rotation security:
Next key commitment: KEL establishes cryptographic commitment to next rotation keys through digests of pre-rotated keys
Live attack resistance: Even if current signing keys are compromised, attackers cannot create valid rotation events without access to pre-rotated keys
TEL inheritance: Since TEL state is anchored to KEL events signed by current keys, compromised signing keys cannot forge historical TEL state - they can only create new (detectable) branches
The threshold mechanism provides Byzantine fault tolerance:
Sufficient majority: Requires M confirmations from N witnesses/Registrars where M >= N - F for F maximum faulty nodes
KAWA/KA2CE: KERI's Agreement Algorithm for Control Establishment ensures witnesses reach consensus on event ordering
Ample property: The minimum participants needed for supermajority ensures one and only one agreement is possible
KERI VDRs scale horizontally through controller autonomy:
Per-controller registries: Each credential issuer operates their own VDR infrastructure, avoiding global bottlenecks
Independent consensus: Witness/Registrar consensus is local to each identifier, not global across all participants
Parallel processing: Multiple VDR queries can be processed independently without coordination
TEL query patterns enable efficient credential verification:
Direct queries: Validators query specific credential state via SAID identifier
Caching strategies: TEL state can be cached with cache invalidation through KEL event monitoring
Incremental updates: Only new TEL events need transmission for validators with historical state
Compact encoding: CESR primitives minimize storage overhead
Sparse registries: Only credentials with state changes require TEL events
Pruning strategies: Obsolete VC TELs (for expired credentials) can be archived while maintaining management TEL integrity
VDRs integrate tightly with ACDC issuance workflows:
ACDCs include an ri (registry identifier) field specifying the VDR that tracks credential state. This enables:
VDRs support ACDC graduated disclosure patterns:
Compact disclosure: Present credential with SAID references, validators query full details from registry if authorized
Selective disclosure: Present partial credential content, registry provides confirmation of unshown attributes
Full disclosure: Present complete credential, registry confirms issuance and current status
The Issuance and Presentation Exchange (IPEX) protocol leverages VDRs:
Issuance exchange: Issuer creates ACDC, records in VDR, presents credential to issuee
Presentation exchange: Holder presents credential, verifier queries VDR for current status
Chained presentations: Multi-hop credential chains verified through respective VDR queries
While not fully detailed in current specifications, source documents suggest evolution directions:
Extending TELs to track credential ownership transfers for transferable credentials, enabling:
Integration with zero-knowledge proof systems for:
Federated query protocols enabling:
The keripy implementation includes a keri.vdr module with subcomponents:
keri.vdr.credentialing: Credential-related VDR operationskeri.vdr.eventing: Event processing and handlingkeri.vdr.verifying: Verification logickeri.vdr.viring: Component wiring/routingThe keriox changelog documents VDR infrastructure evolution including:
The demo witness networks (Wan, Wes, Wil) documented in training materials provide:
KERI verifiable data registries represent a fundamental architectural innovation that:
The VDR architecture achieves what traditional approaches could not: a registry system that is simultaneously verifiable, decentralized, scalable, and privacy-preserving through cryptographic mechanisms rather than trusted intermediaries. By anchoring TEL state to KERI's duplicity-evident KEL infrastructure, VDRs inherit KERI's security properties while extending them into the credential lifecycle domain, enabling a new generation of trustworthy digital credential systems.