Key management: Proving chain of custody over an identifier at any point in time
Key Management Infrastructure
a decentralized key management infrastructure based on key change events that supports both attestable key events and consensus based verification of key events.
Distributed multi-sig
Key management delegation -> to add an additional layer of approval with key rotation (or recovery) (< > issuance of credenitials , which is ACDC)
A Secure Identifier Overlay for the Internet (Samuel M. Smith Ph.D.)
Proof of authorship -
Proof of authority -
drivers license (electricity bills - not having to present paper + signed version of that proof attested by )
composability - combining and using them in different contexts
{TBW}
OOBI
Discovery via URI, trust via KERI: more efficiency, less vulnerability to hacks, purer self sovereignty, and middlemen cut out of the equation.\
(Source )
CESR
Modern and secure digital data streaming over the web. \
(source)
CESR is a dual text-binary encoding format that solves the readability vs performance problem of data encoding.
Problem: In general, currently there is no standard text-based encoding protocol that provides universal type, size, and value encoding for cryptographic primitives. Solution: CESR.
IPEX
The simplification of the IPEX protocol has two primary advantages.
The first is enhanced security. A well-delimited protocol can be designed and analyzed to minimize and mitigate attack mechanisms.
The second is convenience. A standard simple protocol is easier to implement, support, update, understand, and adopt.
SAID
facilitates greater interoperability, reduced ambiguity, and enhanced security when reasoning about the serialization. Moreover, given sufficient cryptographic strength, a cryptographic commitment such as a signature, digest, or another SAID, to a given SAID is essentially equivalent to a commitment to its associated serialization.
CESR-Proof
Signature outside the payload of the stream
Any KERI message -> streaming
Forwarding messages through mailboxen to other controllers is impossible without envelopes.
KERI
Key management: Proving chain of custody over an identifier at any point in time
Key Management Infrastructure a decentralized key management infrastructure based on key change events that supports both attestable key events and consensus based verification of key events.
Distributed multi-sig
Key management delegation -> to add an additional layer of approval with key rotation (or recovery) (< > issuance of credenitials , which is ACDC)
A Secure Identifier Overlay for the Internet (Samuel M. Smith Ph.D.)
Retake control of our data (source )
"It's Single Sign On on Steroïds; this is my end-all-be-all SSO for life”. \ (Source Joseph Hunsaker)
It solves fraud with reputation - Philip Feairheller
“the autonomous control of authentic data and relationships." Timothy Ruff https://rufftimo.medium.com/web3-web5-ssi-3870c298c7b4
ACDC
Secure attribution on the web (reputation)
Proof of authorship - Proof of authority - drivers license (electricity bills - not having to present paper + signed version of that proof attested by )
composability - combining and using them in different contexts
{TBW}
OOBI
Discovery via URI, trust via KERI: more efficiency, less vulnerability to hacks, purer self sovereignty, and middlemen cut out of the equation.\ (Source )
CESR
Modern and secure digital data streaming over the web. \ (source)
CESR is a dual text-binary encoding format that solves the readability vs performance problem of data encoding.
Problem: In general, currently there is no standard text-based encoding protocol that provides universal type, size, and value encoding for cryptographic primitives. Solution: CESR.
IPEX
The simplification of the IPEX protocol has two primary advantages.
SAID
facilitates greater interoperability, reduced ambiguity, and enhanced security when reasoning about the serialization. Moreover, given sufficient cryptographic strength, a cryptographic commitment such as a signature, digest, or another SAID, to a given SAID is essentially equivalent to a commitment to its associated serialization.
CESR-Proof
Signature outside the payload of the stream
Any KERI message -> streaming Forwarding messages through mailboxen to other controllers is impossible without envelopes.
Embedding signatures into
DID-KERI