WebOfTrust / WOT-terms

Concepts and terminology of the KERI Suite
https://weboftrust.github.io/WOT-terms/
Other
4 stars 6 forks source link

What problem does ... solve? #17

Closed henkvancann closed 2 years ago

henkvancann commented 2 years ago

KERI

Key management: Proving chain of custody over an identifier at any point in time

Key Management Infrastructure a decentralized key management infrastructure based on key change events that supports both attestable key events and consensus based verification of key events.

Distributed multi-sig

Key management delegation -> to add an additional layer of approval with key rotation (or recovery) (< > issuance of credenitials , which is ACDC)

A Secure Identifier Overlay for the Internet (Samuel M. Smith Ph.D.)

Retake control of our data (source )

"It's Single Sign On on Steroïds; this is my end-all-be-all SSO for life”. \ (Source Joseph Hunsaker)

It solves fraud with reputation - Philip Feairheller

“the autonomous control of authentic data and relationships." Timothy Ruff https://rufftimo.medium.com/web3-web5-ssi-3870c298c7b4

ACDC

Secure attribution on the web (reputation)

Proof of authorship - Proof of authority - drivers license (electricity bills - not having to present paper + signed version of that proof attested by )

composability - combining and using them in different contexts

{TBW}

OOBI

Discovery via URI, trust via KERI: more efficiency, less vulnerability to hacks, purer self sovereignty, and middlemen cut out of the equation.\ (Source )

CESR

Modern and secure digital data streaming over the web. \ (source)

CESR is a dual text-binary encoding format that solves the readability vs performance problem of data encoding.

Problem: In general, currently there is no standard text-based encoding protocol that provides universal type, size, and value encoding for cryptographic primitives. Solution: CESR.

IPEX

The simplification of the IPEX protocol has two primary advantages.

SAID

facilitates greater interoperability, reduced ambiguity, and enhanced security when reasoning about the serialization. Moreover, given sufficient cryptographic strength, a cryptographic commitment such as a signature, digest, or another SAID, to a given SAID is essentially equivalent to a commitment to its associated serialization.

CESR-Proof

Signature outside the payload of the stream

Any KERI message -> streaming Forwarding messages through mailboxen to other controllers is impossible without envelopes.

Embedding signatures into

DID-KERI

henkvancann commented 2 years ago

continued in a draft here: https://hackmd.io/2_rftT-USdys8onc8Echdw