Skip to content

key event receipt infrastructure

Henk van Cann edited this page Nov 9, 2024 · 3 revisions

Definition

or the KERI protocol, is an identity system-based secure overlay for the Internet.
Source: Dr. S.Smtih

Explanation

It's a new approach to decentralized identifiers and decentralized key management that promises significant benefits for SSI (self-sovereign identity) and ToIP (Trust over IP) infrastructure.
(@drummondreed)

KERI is an identifier system that fixes the internet. It's a fully decentralized permission-less key management architecture. It solves the secure attribution problem to its identifiers and allows portability.
(@henkvancann)

Trust spanning layer for the internet

While attribution has always been a non-exact science, we could come as close to attribution as “beyond a reasonable doubt”, those days are over with KERI.
KERI provides a trust spanning layer for the internet, because the protocol solves the secure attribution problem in a general, portable, fully decentralized way. There are more types of trust IN KERI but they all depend on the most important attributive trust. From KERI we've learned that secure attribution is the essential problem for any identifier system to solve.

Clone this wiki locally