This document is part one. Part two is Q-and-A Security. Both files shares a common Glossary that has:
- an alphabethically ordered list of abbreviations
- an alphabethically ordered list of definitions
The questions are of a varied level: basic and detailed. The answers are mostly directed towards generally interested people and newbies.
*Q = one star question. Novice to KERI, advanced in DIDs
**Q = two star question. Proficient in DIDs and advanced in KERI
***Q = three star question. Expert in DIDs and proficient in KERI
Why should you read or step through the Q&A? To get a different angle to the same topic: KERI.
KERI receives three types of scrutiny from domain experts:
- "KERI can't do it"
- "KERI doesn't do something new"
- "DID:XYZ has been designed, KERI needs to explain how it's different"
- Ad 1. When respected colleagues think KERI can't keep up to its promises, we value the well-founded questions and suggestions of domain experts after they thoroughly read the KERI whitepaper. We'll happilly keep explaining KERI because we'd hate it when respected experts misunderstand the design.
- Ad 2. After a while some experts say 'well then KERI doesn't do something new'. That's acceptable for us, because we're able to proof the design history of KERI and that it simply hasn't been done before.
- Ad 3. However, we can't accept having to explain the differences to people who just "invented" new, someting similar to KERI, using the same terms and thereby spreading confusion. Let the newbees benchmark themselves against KERI, we are too busy for those kind of things. By the way, this Q&A may be able to help you out.
We welcome every form of positive contribution and will certainly allow for learning time!
The questions are of a varied level: basic and detailed. The answers are mostly directed towards generally interested people and newbies.
*Q = one star question. Novice to KERI, advanced in DIDs
**Q = two star question. Proficient in DIDs and advanced in KERI
***Q = three star question. Expert in DIDs and proficient in KERI
{TBW} means: to be written
{TBW prio 1} means to be written with the highest priority, 3 = no urgency, 2 = intermediate}
Inspired by presentation given and questions asked on the SSI webinar May 2020, but also issues raised and the progress made, here on Github (Turn on 'Watch' if you want to be notified of conversations).
Beware: A Q&A is always work in progress. Tips & help welcome.
None of the respondents in the open repo and presentations have been explicitly named as a source, except for Samuel M. Smith Ph.D. and @henkvancann. If there is no reference added to the answers, then it's Samuel M. Smith who answered the question. Most of the editing is done by @henkvancann, which might have introduced ommission, errors, language glitches and such. Sorry for that, feel free to correct by submitting a pull request (PR).
For practical reasons educational images uploaded by Github members have been downloaded. We de-personalised them by giving images a new name. Under these new names these images have been uploaded to github and used in the Q&A to clarify the questions and answers.
KERI's content is licensed under the CC by SA 4.0. license. Parts of the video offered on SSI Meetup webinar 58 have been captured and uploaded to Github to support the answers to general questions about digital identity and more in depth answers to question about KERI.
We've done our best to protect the privacy of the Github by investigating the images we used. We haven't come across personal identifiable information (pii). However, should we have made a mistake after all, please let us know and we'll correct this immediately.
- Definitions: - Ambient verifiability - Agent - Agency - Autonomic Identifier - Autonomic Namespace - Autonomic idenity system - Byzantine Agreement - Content-addressable hash - Controller - Control Authority - Correlation - Cryptocurrency - Decentralized Identity - Derivation code - Duplicity - Entropy - Establishment Event - End verifiable log - Entity - External consistency - Inception Event - Inconsistency - Identity - Internal inconsistency - KERI Agreement Algorithm for Control Establishment - Key - Key Event Log - Key Event Receipt Log - Namespace - Non-Establishment Event - Payload - Public Key Infrastructure - Root of trust - Seal - Secret - Self Addressing Identifier - Self Certifying Identifier - Self Sovereign Identity - Spanning layer - Transaction Event Log - Transfer - Trust-over-IP - Validator - Verifiable Credential - Verifiable Data Storage - W3C DID - (Digital Identity) Wallet
Table of contents generated with markdown-toc
- The definitions in the glossary
- Public private key pairs
- Hashing and hashes
- Signatures
- W3C DIDs
- Accrue knowledge and keep existing knowledge up to date
- create a key pair safely and back it up safely
- sweep to a new wallet
- General
- Why the internet is broken
- KERI and DIDs
- Wallets
- Signatures
- Proofs
- Private Key Management
- Blockchain
- Root of trust
- KERI operational
- Agencies
- Virtual Credentials
- Q&A section KERI security considerations
- KERI operational security
- Identifiers
- Event logs
- Inconsistency and duplicity
- Key rotation
- KEL and KELR
- Witness
- Watchers
- KERI and blockchain settled DIDs
- Security Guarantees
Key Event Receipt Infrastructure; a secure identifier overlay for the internet.
Hmm, a mouthful of terms. Let's start with the identifier. One of the basic (!) forms of KERI identifiers is this example:
This is most probably the form in which you might get to see KERI (just as an example!):
BDKrJxkcR9m5u1xs33F5pxRJP6T7hJEbhpHrUtlDdhh0
<- this the bare bones _identifier_
did:un:BDKrJxkcR9m5u1xs33F5pxRJP6T7hJEbhpHrUtlDdhh0/path/to/resource?name=secure#really
<- this is _a call to resolve_ the identifier on the web
Currently KERI
is just code, that can be tested and executed in a terminal on the command line. Private key management of KERI will look like wallets
.
Key Event Logs (KEL
) and Key Event Receipt Log (KERL
) are files with lots of encrypted stuff in there.\
It does not require the current internet and it's protocols to change, nor Trust over IP (ToIP
) system or current blockchains to change. KERI can be added to it and, nevertheless, KERI can function all encompassing.
(henkvancann)
Because there is no secure universal trust layer for the internet, currently (2020).
KEI is both privacy preserving and context-independent extensible. This means KERI is interoperable accross areas of application on the internet. It does so securely, with minimal sufficient means.
Sam Smith: KERI essentially repairs internet.
In the decentralized identity space KERI solves the portability of Self Sovereign Identifiers. Currently you can't move the indentifiers you control from one platform or one infrastructure to another. And that makes your self-sovereign identifiers not truly self sovereign. KERI fixes this.
Because we've been reconfiguring and rethinking the security guarantees behind decentralized identity systems since 2015. To overcome the lack of portability in the current decentralized identity systems, we've introduced a few new concepts that some people in the decentralized identity ecosystem have trouble to get their head around. Especially the blockchain oriented part of the community.
There is a whole section to answer this simple question that has many-sided answers: KERI and DIDs.
To begin with KERI has no blockchain, and doesn't depend on blockchains. If an implementation of KERI depends on blockchains at all, KERI operates blockchain agnostic.
Secondly KERI doesn't support a crypto currency. It doesn't need currency because it can easily connect to one, if needed. And again, KERI is crypto currency agnostic while doing so.
Lastly KERI is fundamentally different from blockchains like Ripple (Permissioned PBFT consensus) or Stellar (imcomplete open public, non-permissioned PBFT consensus): it doesn't need total ordering, timestamping and Proof of Authority consensus on transactions registered on a ledger.
Blockchain and KERI is comparing apples and oranges. But we're happy to do that exercise for the hard-to-convince part of the SSI community.
KERI is nothing like we already know of. It's a mixtures of things.
You can't say _"Oh, KERI lays eggs, so it must be a reptile"_ It's not a reptile.
And then you go _"I see, but it gives birth, so it must be a mammal"_.
It's also not a mammal. It's KERI.
It may have the characteristics you describe, but it's a species of its own.
(_SamMSmith_)
**Q: How can you get away with not complying to the security model (and guarantees) of an open public blockchain?
KERI better fits the Identity space. Doing away the total ordering in blockchains is a huge performance - and throughput gain, plus less worry about goverance. There's also not such a thing as consensus forks. KERI solves (or "gets away with" if you wish) this by a mechanism called duplicity detection. Watchers are all that matter. They guarantee that logs are immutable by one very simple rule: "first seen wins".
There is a separate Q&A Security to answer the extensive list of Security related questions.
WASM is certainly on the roadmap, but for the main issue of Sidetree and did:peer interop, see the core KERI spec repo issue for more info.
(CharlesCunningham)
*Q: How does KERI match the trust-over-ip
model and how does KERI fit in the W3C DID standardization
?
The ToIP stack has a left side (governance) and the right side (technical) KERI is at lower levels of the ToIP. Other DID methods will add KERI to their method and that's how KERI could be present in these layers.
- Its goal is to be the missing authentication layer of the internet. That's a pretty well matching objective.
- Layer 1 (settlement layer): Where other
DID
s use blockchains or databases to register identities and settle 'transactions' between between,DDO
s, andVC
s, KERI uses homegrown native structures:KEL
andKERL
. (@henkvancann) - Layer 2 (communication layer): Non-existing in KERI, because KERI is end-verifiable. KERI can use any other means of communication between actors in the ecosystem
- Layer 3 (transaction layer): Since KERI focuses on the more fundamental part of authentication for the internet, you won't find matching functionality for usual trust-over-IP transaction like VCs or money. VCs (layer 3) relate to KERI only as content hashpointers in KELs, there are no native structures for VCs present in KERI.
- Layer 4 (application layer): Same: KERI is non-existing in this layer.
To summarize: Once we talk DID, we already talk about layers above KERI.
(@henkvancann)
- The KERI developers provisionally design DID:KERI, which might become a mixture of DID:KEY, DID:PEER, and DID:WEB, combinable with more functional DIDs in the Identity spectrum DID:SOV, DID:ETHR, etc.
- No verifiable credentials (@henkvancann)
KERI solves the problem of secure attribution to identifiers. By using self-certifying identifiers (SCI
s) and ambient availability of verifiable Key Event Logs (KEL
) that prove authoritive control over identifiers' private keys. It can't be solved by onther solutions known so far because those solution have not managed to span identifier interoperability over the internet and function all the same as an overlay.
(@henkvancann)
KERI sits under the Decentralized Identity Foundation, DIF, in its own working group "KERI".
It started of in 2020 under the Identity and Discovery Workgroup of DIF.
Due to its licensing structure, KERI isn't owned by anyone and everyone at the same time. The Intellectual Property Right of KERI is hosted with DIF
. It is an open source project.
On github KERI is - and will become even more - a thickening bunch of repositories:
- https://github.com/decentralized-identity/KERI Key Event Receipt Infrastructure - the spec and implementation of the KERI protocol
- https://github.com/decentralized-identity/KERIpy Python Implementation of the KERI Core Libraries
- https://github.com/decentralized-identity/kerijs JavaScript (nodes) Implementation of the KERI core library.
- https://github.com/decentralized-identity/kerigo Go implementation of KERI (Key Event Receipt Infrastructure)
- https://github.com/decentralized-identity/keriox Rust Implementation of the KERI Core Library
- https://github.com/stevetodd/keri-java Java implementation of KERI
Lastly, the important man, who founded KERI is Samuel M. Smith Ph.D., operationing from his firm prosapien.com. (@henkvancann)
In Python. It will be available in the coming year in Rust, Javascript and Go (2020). (@henkvancann)
*Q: How does KERI fit in the 10 principles of SSI by Christopher Allen?
KERI is not primarily about self-sovereign identity. KERI is primarily about autonomic identifiers, AIDs. That is: identifiers that are self managing. KERI provides proof of control authority over the identifier. What one does with the identifier is not constrained by KERI. But because the primary root of trust of an AID is a KEL which can be hosted by any infrastructure, any identity system (SSI or otherwise) built on top of KERI may also be portable.
So in my opnion portability of the associated identifiers is essential to any truly self-sovereign identity system.
(SamMSmith)
Where Christopher Allen is talking about portability of information related to the identity, in KERI we take this a step further with the portability of the identifier itself with respect to its supporting infrastructure (aka spanning layer). Most DID
methods do not have portable identifiers. They are locked to a given ledger.
(SamMSmith)
Yes, KERI sits under the Decentralized Identity Foundation, DIF, and was part of the Identity and Discovery Workgroup. In 2021 the increased activity around KERI and its specific nature needed to have an own group within DIF. There are also non-formal relation with the newly launched trust-over-ip foundation, and there's good reasons to fit KERI into trust-over-ip.
(SamMSmith and @henkvancann)
See the definitions section for what both terms mean. For example, theories of ethics are generally normative
- you should not kill, you should help that person, etc. Economics is most commonly non-normative
- instead of asking “how should this person choose which goods to buy?”, we are often more interested in “how does this person choose which commodities they buy?”.
The whitepaper is the historically grown and expanded design document of KERI
.
A KID is focussed on Implementation; "this is how we do it" We add commentary to the indivudual KIDs that elaborate on the why. It has been split from the how to not bother implementors with the why.
*Q: KERI has invented its own key representation and signature format. Why not conforn to current standards already available?
In brief these are these reasons:
- the desire to control the entire stack, and not use anyone else's tooling
- DID and VC layers are the appopriate layers for interopability
- The performance/security goals of KERI drive its design and therefore KERI can't use so called enveloped data formats
*Q: In the KERI system design trade space you strike out features, so you must have stroked out application space too; which?
- Applications where total ordering of key event is needed, like in cryptocurrencies and non-fungible tokens. However, KERI is suitable:
- to build smart contracting in a direct peer-to-peer way
- to build Sidetree with KERI, vice versa is not possible
- to implement blockchain / ledger anchored identifiers (SamMSmith and @henkvancann)
Yes, KERI gives you the security. And by supplying secure state machines. But you have to gather the right transactions yourself.
Ledgers co-mingle secure state machines into one another, Ledger are total ordering. We don’t need totla ordering in KERI. The absence of a ledger gives us the ability to create totally private smart contracts between Bob and Alice.
You use the KERI Duplicity detection to determine the authoritive key is used at a certain point in time.
Since March 2021 KERI is a seperate DIF working group and it would possible to create a dedicated project within the working group to research smart contracting with KERI. (@henkvancann)
The Internet Protocol (IP) is broken because it has no security layer.
(SamMSmith)
The security measures the internet has are _bolt-on_s and dependent of intermediary parties. For example the X.509 protocol for DNS. KERI offers a native end-verifiable protocol in a direct (peer-to-peer) and indirect way (duplicity detection in ambient available KERLs). The indirect KERI method removes the need for a middleman, an intermediary, like a Certification Agency for DNS.
(@henkvancann)
Establish authenticity between the key pair and the identifier of IP packet’s message payload. See more in an explanatory presentation.
(_SamMSmith_)Administrative Identifier Issuance and Binding; especially the binding between keypair and identifier based on an assertion of an intermediairy administrator. This is what's weak and therefore wrong. See more in an explanatory presentation.
(@henkvancann)
A DNS hijacking wave is targeting companies at an almost unprecedented scale. Clever trick allows attackers to obtain valid TLS certificate for hijacked domains. more.
(@henkvancann)
The IPv4 layer
was become a standard internet transport layers over the years. It is a very strong structure. The transport layer has no security build into it. So the trust layer has to be something higher in the stack. However in the Support Application layers that sit on top of that IPv4, no standardization has taken place yet. It is a highly segmented layer and trust is therefore locked in those segments or platforms; it's not interoperable accross the internet. E.g. platform Facebook
provides an identity system that only works within their domain. That's the same with for example Google
or any number of blockchain.
We don't have a trustable interoperability. And that leads to the idea that the internet is broken. We want to fix that, we don't want a domain segmented internet trust map, a bifurcated internet, we want to have a single trust map. This is the motivation for KERI
.
(SamMSmith)
With a waist and a neck. (@henkvancann)
Much of the operation of internet infrastructure is inherently decentralized, but control over the value transported across this infrastructure may be much less so.
Centralized value capture systems concentrate value and power and thereby provide both strong temptations for malicious administrators to wield that concentrated power to extract value from participants.
We believe that decentralization of value transfer is essential to building trust. Consequently a key component for a decentralized foundation of trust is an interoperable decentralized identity system. Source: whitepaper page 7
KERI
is also the name of a DID
method in the making Method spec. The proposed related DID
method is did:keri
. A session at the recent IIW31 presented by Jolocom’s Charles Chunningham examines overlap between data models of DID documents and KERI
identifiers here.
Drummond Reed (Dec 2 2020) on did:KERI
: "at IIW we asked that question and feedback overwhelmingly favored did:KERI
. Furthermore, I’ve proposed that the KERI namespace be reserved within the method-specific ID spaces of other DID methods as well, The Indy community has agreed to reserve the KERI namespace in the Indy DID method."
(@henkvancann)
**Q: Some say that with KERI, a DID can be reduced to did:<identifier>. But that’s not a valid DID?!
Every DID must have a method name component before the method-specific ID.
The first paper mentioning the absence of the method is Thinking of DID? KERI On by The Human Colossus Foundation, written by Robert Mitwicki. He addressed the concern in the question (the invalidity of the DID method) and made it more clear what the Foundation meant by that: "We look into the future and with that view we think that namespace could be dropped and we could keep only identifier, as the namespace seems to be one of the major drawbacks of decentralized identifiers at the moment. In my opinion did:KERI:<identifiers>
would be just intermediate step as the issue addressed by post would still hold. We see that KERI could be a major upgraded for DID; not replacement."
**Q: Isn't it a bit arrogant of KERI to say "my new DID method is so good that it can replace all others for all eternity"?
But by doing this, you will also exclude a lot of existing identifier infrastructure.
I am not denying existence of existing DID infrastructure, but I agree a lot of them could be obsolete if we introduce KERI. A lot of business models which are build upon current model would be obsolete. I understand that a lot of people would not like that, but that is called progress.
(RobertMitwicki)
Yes, a wallet is very much needed. A wallet holds your public private key pairs that embody the root of trust of KERI identifiers. Universal wallet - would do - with a thin layer on top of it.
A wallet needs to be adapted to KERI to be able to carry KERI identifiers.
{TBW}
(SamMSmith) / (CharlesCunningham) / (@henkvancann)
{TBW}
We don't need a crypto currency embedded in the KERI system, we can use any other crypto currency system for payment. So the design of the KERI system has left crypto token control out.
(@henkvancann)
The KERI whitepaper has little about virtual credentials and KERI's place in the W3C SSI space for DIDs and VCs. The reason is that KERI is mainly a level 1 and level 2 solution in the trust-over-ip framework.
(@henkvancann)
In this presenation of SamMSmith, there's a lot about the relation between KERI and VCs: https://github.com/SmithSamuelM/Papers/blob/master/presentations/GLEIF_with_KERI.web.pdf
Depends on what you mean with proof. KERI is content agnostic, so any cryptographic proof can be referenced and signed in a KEL, even a third party signature. As far as KERI-internal proofs are concerned a subject-controller, a delegated controller and combination of (fractioned) multi-signatures can prove authoritative conrol over a key and over a pre-rotated key. (@henkvancann) {TBW prio 1}
In general they can proof the authoritive control over a private key at a certain point back in time. (@henkvancann)
Yes they do. For every cause there is a different payload. The main reason why all roles sign off cryptographical references is commitment to those sources (the payload in KERI is often a digest of sources) at a certain point in time.
(@henkvancann)
KERI identifiers can be “delegated”, meaning one identifier can create another one that can prove its relationship with its parent. This way you can create any hierarchy of identifiers & keys.
KERI has the ability to proof various things:
- Control over an Autonomous identifier (
AID
). - Control over a pre-rotated key
- Commitment to an Event Log
- Content addressing by a hash
- Delegation of control over a key
- {TBW prio 2}
No, KERI is data agnostic. KERI does make no statement about the validity of the payload data.
(@henkvancann)
We may verify that the controller of a private key, made a statement but not the validity
of the statement itself.
(SamMSmith)
We may build trust over time in what was said via histories of verifiably attributable (to whom) consistent statements, i.e. reputation
.
(SamMSmith)
It means that the required threshold of signatures has been met. It doesn't mean that all signatures have been provided.
**Q: Do I need to show the full log (KEL) to anybody I transact with, even though I'd only like to show a part of it, for example a virtual credential?
Yes, because they can't verify the root of trust. They have to have access to the full log at some point in time. Once they verfied to the root of trust, once, they don't have to keep a copy of the full log. They have to keep the event they've seen and any event since, that they need to verify as they go. (SamMSmith)
**Q: What's the difference between interactive - and non-interactive proof (for example proof of Authentication)
Interactive proof of authentication requires both parties interacting, it uses bandwidth, I can't batch the interactions either. So it's not scalable.
Non-interactive proof of authentication -> digital signature with public private key pair.
Non-interactive has huge advantages for scalability.
The weakness is of non-interactive
proving is replay attack ( the interactive method has built-in mechanism to prevent replay attacks ).
Replay attack is some adversary is replaying a request for access in your name after having gained access to your private keys.
Solution to replay attack is both Uniqueness
and Timeliness
.
Uniqueness works with a nonce
, that's being obtained by a challenge-response mechanism and the requester has to use that nonce to seal the request.
Timeliness is even better because it can service both properties needed in one go. If we use a Date-time-stamp (monotonic) in time window we can be sure that the sender request is unique and has been established in an acceptable timeframe.
So therefore the non-interactive mechanism to replay attack prevention has been suggested in KERI implemented by Date-time-stamp (monotonic).
The time window can be fairly large because you use monotonicity.
How can I use KERI to filter connections with the outside world? Any public enquiry should be filtered upfront.
My e-mail address or phone number are publicly available and anyone can contact me, I'd like more privacy.
I you want to talk to me, you send a message to my public identifier.
First use a public identifier and then set up a private pairwise connection.
You don't need to a strong correlation of your public identifier to you as an entity, but only to your "local" reputation, expressed by the KEL itself.
The correlation in KERI is never public, always private. Spam goes away because of the provable assestation.
(SamMSmith) and (@Chunningham)
The controller uses her private key
to authoritatively and non-repudiably sign statements about the operations on the keys and their binding to the identifier, storing those in an ordered key event log (KEL
). One of the important realizations that make autonomic identity systems possible is that the key event log must only be ordered in the context of a single identifier, not globally. So, a ledger is not needed for recording operations on identifiers that are not public. The key event log can be shared with and verified by anyone who cares to see it.
The controller also uses the private key to sign statements that authenticate herself and authorize use of the identifier. A digital signature also provides the means of cryptographically responding to challenges to prove her control of the identifier. These self-authentication and self-authorization capabilities make the identifier self-certifying and self-managing, meaning that there is no external third party, not even a ledger, needed for the controller to manage and use the identifier and prove to others the integrity of the bindings between herself and the identifier. Thus anyone (any entity) can create and establish control over an identifier namespace in a manner that is independent, interoperable, and portable without recourse to any central authority. Autonomic identity systems rely solely on self-sovereign authority.
(@windley)
More in The Architecture of Identity Systems
KERI has univalent
, bivalent
and multivalent
infrastructures.
You need Key-pair Generation and Key-Event-Signing Infrastructure. And KERI doesn't care how you do it.
From bivalent
delegation {fill out?!} comes into play. But in fact you can have multivalent
infrastructures, all with their own security garantuees and its own key management policies.
It's all one KERI codebase to do all these infrastructures.
(SamMSmith)
No, because the derivation code allows you to use whichever format you want. So anyone that sees an identifier looks at the first byte or two bytes prepended, it's a derived code, and you can tell exactly what type of public-private-key format we have, e.g. ecdsa.
When you rotate keys, you can always rotate to a different format.
Yes, you can derive your keys from that scheme. But KERI is agnostic about it, it wouldn't know.
To begin with, yes, KERI fully depends on PKI
cryptography. KERI was built upon the assumption of unbreakable public private keys.
By the way, in KERI we say identifier, because identity is a loaded term, lots of misunderstanding around it.
Pre rotated keys are best practise to keep control of your identifiers.
If you lose unique control of a key right after inception, before rotation, are there no garantuees to be given for KERLs via witnesses / watchers or whatever. Is the only thing you can do about it, is revoke the key in that case?}
(@henkvancann)
Currently Universal wallet is aimed at to store KERI keys. The vast majority of security breaches or exposures of keys are originated by the behaviour of people: the way they use wallets. Most rarely due to errors in the wallet software. {TBW prio 1}
**Q: Are compound private keys (Shamir Secret Sharing) and multisignature schemes possible to incept identifiers?
Yes, complex fractional structures are natively possible in KERI. However only for the non-basic forms (for transferable identifiers).
(@henkvancann)
{TBW prio 1}
{TBW prio 3}
No, but KERI uses the same cryptographical building blocks as blockchains do.
(@henkvancann)
However, KERI may be augmented with distributed consensus ledgers but does not require them. Source: section conclusion in whitepaper
KERI
is a unordered hash-linked list of signed Key Event logs and blockchain is a timestamped ordered list of hash-linked blocks of signed transactions. What this means:
- we don't need ordering in
KERI
and that frees us from consensus protocols in blockchains - Hash-linking is done on a lower level in
KERI
and preserves consistency and fuels revealance of duplicity. - In
KERI
proofs are cryptographically derived from the root of trust, being the autonomous controller, in blockchains the root-of-trust is a transaction on a ledger; that means the Identifier gets locked on the ledger.
(@henkvancann)
Because for our purposes we don't need to. Consider two distinct identifier to totally ordered, distributed consensus ledger:
- the access identifier that allows you to access the ledger. This one is ussually a
SCI
. E.g. on bitcoin your bitcoin address is cryptographically derived from the public key from your keypair. - the register identifier that allows you to register an identifier on the ledger. The ledger transaction is validated registering of your identifier, not the cryptographic root-of-trust that the access identifier is using.
The identifier is now locked to that ledger. We want identifiers to be portable accross ledgers, so we don't want to use registration as the root-of-trust, we want to be self-certified all the way. (SamMSmith)
that you send to witnesses, who observe them and attest to the particular line of operations they see?
In brief: for KERI that is an apples and oranges comparison.
Because total linear ordering is not needed for a given identifier's event sequencing. Only linear order of that identifier's history. The history's from other events do not have to be ordered with respect to each other. So the secure ordering of a given identifier's history is a completely different class of problem than the secure total ordering of comingled history from multiple identifiers. The security demands are less for the former case. So the equivalent security may be obtained in other ways. While the latter as a side effect of total ordering gives local ordering (per identifier) for free. But securing total ordering may be much harder to do. So one has to be careful, because it's no longer an apples to apples comparison. (SamMSmith)
Primary root of trust is KEL not secondary (starts with self cert ID), but then after the first rotation, if any, you must have a KEL.
(SamMSmith)
A trust basis binds controllers, identifiers, and key-pairs.
A trust domain is the ecosystem of interactions that rely on a trust basis.
***Q: KERI does not need a blockchain, but how does it establish the root-of-trust that we need for SSI? How does the data persist?
The KELs
are what establishes the root of trust in KERI
. So you have a SCI
and a KEL
. The KEL
is ordered with respect to the SCI by the controller. You don't need total ordering with respect to other identifiers to establish the root of trust in KERI
, because the controller is the one and only, who orders events.
In blockchains you have total ordering, which you need for double spend protecting in cryptocurrencies, but not in KERI
.
For people in blockchain this is a bit hard to grasp, but we don’t need hash chained data structure of events on single identifier nor the ordering those, I just need logs, I need append-only logs of events to establish the authority.
And so I defend myself against duplicity
.
(SamMSmith)
In brief: with end-verifiability anyone can verify anywhere at anytime, without the need to trust anyone or anything in between.
Because any copy of an end-verifiable
record or log is sufficient, any infrastructure providing a copy is replaceable by any other infrastructure that provides a copy, that is, any infrastructure may do. Therefore the infrastructure used to maintain a log of transfer statements is merely a secondary root-of-trust
for control establishment over the identifier. This enables the use of ambient infrastructure to provide a copy of the log. The combination of end verifiable logs served by ambient infrastructure enables ambient verifiability, that is, anyone can verify anywhere at anytime. This approach exhibits some of the features of certificate transparency and key transparency with end-verifiable event logs but differs in that each identifier has its own chain of events that are rooted in a self-certifying identifier.
On (sub)page(s of) github.
The homepage on github README.md pretty much sums up all the possibilities to download the available code and how developers can currently engage in the development process. We welcome all help we can get.
- Its main drawback is that it's nascent. (SamMSmith)\
- The field of cryptography is already complex by itself. KERI's extended complexity, combined with totally new terms and new process description make it a steep learning curve. It depends on your individual drive to want to know about KERI, to what extent the effort pays off. Maybe first try:
- KERI made easy
- The general KERI Q&A (@henkvancann)
- KERI is inventing its own lowest level building blocks. That will prevent a lot of potential code reuse. (@OR13)
KERI
does one thing, it establishes control authority using verifiable portable proofs that are KEL
s.
(SamMSmith)
KEL
, KERL
and KAACE
might well be very lean alternatives to blockchain based solutions. The hard part is the ambient verifiable architecture.
(@henkvancann)
In brief: yes, pre-rotation with hashed public keys and strong one-way hash functions are post-quantum secure.
Post-quantum cryptography deals with techniques that maintain their cryptographic strength despite attack from quantum computers. Because it is currently assumed that practical quantum computers do not yet exist, post-quantum techniques are forward looking to some future time when they do exist. A one-way function that is post- quantum secure will not be any less secure (resistant to inversion) in the event that practical quantum computers suddenly or unexpectedly become available. One class of post-quantum secure one-way functions are some cryptographic strength hashes. The analysis of D.J. Bernstein with regards the collision resistance of cryptographic one-way hashing functions concludes that quantum computation provides no advantage over non-quantum techniques.
Strong one-way hash functions, such as 256 bit (32 byte) Blake2, Blake3 and SHA3, with 128 bits of pre-quantum strength maintain that strength post-quantum.
Source: whitepaper page 65
Any controller can install a Service/Agent Log, controlled by them.
{TBW prio 2}
*Q: How to bootstrap KERI on the internet? Is it like fax machine; the more KELs there are, the more effective it is?
Any subject / controller can start creating KERI events in a KERI event log. Dependent of the objectives a controller has with KERI a more peer-to-peer (one-to-one) approach or contrary to that a one to many approach. In the latter case a set of witnesses and their services can emerge per controller. Subsequently one or more verifiers (and their watchers) can also enter the play. The more entities are getting used to play the different KERI specific roles the more rapid and easy will the bootstrapping / flooding of KERI on the internet evolve. {TBW prio 1}
The SSI Meetup webinar on KERI took place in May 2020 and is a good lesson and source of information.
There is lots of course material available on prosapien.com.
(@henkvancann)
*Q: Could KERI work for edge computers that need self sovereign identity? How to (selectively) share control over the SCI
/SAI
with the owners of the device?
Delegation could be used. There is an issue about IoT key and identifier management with KERI
that answers this question profoundly.
(SamMSmith)
Decentralized systems must coordinate across multiple parties, all acting independently in their own self-interest. This means that the rules of engagement and interaction must be spelled out and agreed to ahead of time, with incentives, disincentives, consequences, processes, and procedures made clear. {TBW prio 3} DRAFT BY (@henkvancann)
KERI is self-administered, self-governed. What aspects of KERI need governance?
Purist permissionless network proponents will argue that a real decentralized network does not need a governance framework since mathematics and cryptography make sure that proper governance is in place.
The Trust over IP stack includes both a governance stack and technology stack.
- Controller, Entropy hardware and software, KEL, KERL
- Governance of capabilities of digital wallets, agents, and agencies. So the need is primarily to establish baseline security, privacy, and data protection requirements, plus interoperability testing and certification programs, for the following roles:
- Hardware Developers: hardware security modules (HSMs)
- Software Developers: duplicity verification and internal consistency checks
- Agency: ambient availability of KELs and KERLs
KERI is not an outspoken credential issuance and verification framework. Having said that:
- Controller: inception proof, revocation, delegation proof
- Holders: availability
- Verfifier: external inconsistency proofs
- KERIs objective is to be the spanning trust infrastructure of the whole internet
- Portability of the identities and KERI interoperability between platforms is cryptographically secured
- Inconsistencies "reported" by meercats-like alert governance system
A. In a pair-wise setting each party only needs to be consistent with the other party. Witnesses are not used. It doesn't matter if they lie to each other as long as they lie consistently. KERI does not
enable someone to proof the veracity of a statement only the authenticity of the statement.
(SamMSmith)
B. If 3 parties are involved in a transaction all they need do is query each other for the copy of the KEL
that each is using for each other to ensure that there is no duplicity.
(SamMSmith)
C. To guarantee undetectable duplicity requires a successful eclipse attack* on all the parties. KERI
merely requires that there be sufficient duplicity detection in the ecosystem.
This would be a set of watchers
that the validators trust that record any and all copies of key event logs (KEL
) that they see. Because these watchers
can be anyone and anywhere, any controller of a public identifier is at peril should they choose to publish inconsistent copies of their KEL
. This removes the incentive to be duplicitous.
'* Any blockchain system is also vulnerable to such an eclipse attack.
(SamMSmith)
Why do we want portable identifiers instead of the Ledger Locked IDs, since we have DIDs that can resolve a ledger locked Id uniformly? You say “We don’t want to use certification as a root of trust, we want to do it self-certified all the way” -> what about the issuance of a credential based on the ledger locking, isn’t that beneficial?
Or does (Delegated, Multi-sig) Self-Adressing do the job? {TBW Prio 2}