📄️ ACDC
See
📄️ ADC
See
📄️ ADR
See
📄️ AID
See
📄️ APC
See
📄️ API
See
📄️ AVR
See
📄️ BADA
See
📄️ BFT
See
📄️ BOLA
See
📄️ CBOR
See
📄️ CESR-version
Definition
📄️ CESR
See
📄️ CLC
See
📄️ CRUD
Definition
📄️ CSPRNG
Definition
📄️ CT
See
📄️ DAG
See
📄️ DAR
See
📄️ DEL
See
📄️ DHT
See
📄️ DID
See
📄️ DKMI
See
📄️ DPKI
See
📄️ E2E
See
📄️ ECR
See
📄️ ESSR
See
📄️ FFI
See
📄️ GAR
See
📄️ GLEIF
Definition
📄️ GLEIS
Definition
📄️ GPG
See
📄️ HSM
See
📄️ Home
Welcome to the WebofTrust terms wiki!
📄️ I-O
See
📄️ IANA
See
📄️ IPEX
See
📄️ ITPS
See
📄️ JOSE
See
📄️ JSON
See
📄️ KA2CE
See
📄️ KAACE
See
📄️ KAPI
Definition
📄️ KAWA
See
📄️ KEL
A Key Event Log.
📄️ KERI
See
📄️ KERIA-agent
Definition
📄️ KERIMask
Definition
📄️ KERISSE
See
📄️ KERL
See
📄️ KID
See
📄️ KRAM
See
📄️ LEI
Definition
📄️ LID
See
📄️ LLM
See Large Language Model
📄️ LoA
See
📄️ LoC
See
📄️ MFA
See
📄️ MIME-type
See
📄️ NFT
See
📄️ OOBI
See
📄️ OOR
See
📄️ P2P
See
📄️ PGP
See
📄️ PID
See
📄️ PKI
See
📄️ PRNG
Definition
📄️ PTEL
See
📄️ QAR
See
📄️ QVI
See
📄️ RID
See
📄️ RUN
Definition
📄️ SAD
See
📄️ SAID
See
📄️ SATP
See
📄️ SCID
See
📄️ SKRAP
See
📄️ SKWA
See
📄️ SPAC
See
📄️ SSI
See
📄️ TCP
See
📄️ TEE
See
📄️ TEL
See
📄️ TOAD
See
📄️ TPM
See
📄️ TSP
See
📄️ UI
See
📄️ URL
See
📄️ VC
See
📄️ VCTEL
See
📄️ VDS
See
📄️ VID
See
📄️ XBRL
See
📄️ abandoned-identifier
Definition
📄️ access-controlled-interaction
Definition
📄️ agency
Definition
📄️ agent
Definition
📄️ ambient-verifiability
Definition
📄️ ample
Definition
📄️ append-only-event-logs
Definition
📄️ application-programming-interface
Definition
📄️ architectural-decision-record
Definition
📄️ attribute
Definition
📄️ attributional-trust
Definition
📄️ authentic-chained-data-container
Definition
📄️ authentic-data-container
Definition
📄️ authentic-data
Definition
📄️ authentic-provenance-chain
Definition
📄️ authentic-web
Definition
📄️ authenticity
Definition
📄️ authoritative
Definition
📄️ authority
Definition
📄️ authorization
Definition
📄️ authorized-vlei-representative
Definition
📄️ autonomic-computing-systems
Definition
📄️ autonomic-identifier
Definition
📄️ autonomic-identity-system
Definition
📄️ autonomic-namespace
Definition
📄️ autonomic-trust-basis
Definition
📄️ backer
Definition
📄️ base-media-type
Definition
📄️ base64
Definition
📄️ bespoke-credential
Definition
📄️ best-available-data-acceptance-mechanism
Definition
📄️ bexter
Definition
📄️ binding
Definition
📄️ bis
Definition
📄️ bivalent
Definition
📄️ blake3
Definition
📄️ blind-oobi
Definition
📄️ blinded-revocation-registry
Definition
📄️ bran
Definition
📄️ branch
Definition
📄️ broken-object-level-authorization
Definition
📄️ brv
Definition
📄️ byzantine-agreement
Definition
📄️ byzantine-fault-tolerance
Definition
📄️ canonicalization
Definition
📄️ certificate-transparency
Definition
📄️ cesr-proof-signatures
Definition
📄️ cesride
Definition
📄️ chain-link-confidential-disclosure
Definition
📄️ chain-link-confidentiality
Definition
📄️ chain-of-custody
Definition
📄️ cigar
Definition
📄️ claim
Definition
📄️ clone
Definition
📄️ cloud-agent
Definition
📄️ code-table-selector
Definition
📄️ code-table
Definition
📄️ cold-start-stream-parsing
Definition
📄️ collective-signature
Definition
📄️ collision
Definition
📄️ compact-disclosure
Definition
📄️ compact-variant
Definition
📄️ complementary-integrity-verification
Definition
📄️ composability
Definition
📄️ composable-event-streaming-representation
Definition
📄️ composable
See
📄️ concatenation
Definition
📄️ concise-binary-object-representation
Definition
📄️ confidentiality
Definition
📄️ configuration-files
Definition
📄️ configuration-traits
Definition
📄️ consensus-mechanism
Definition
📄️ content-addressable-hash
Definition
📄️ contextual-linkability
Definition
📄️ contingent-disclosure
Definition
📄️ contractually-protected-disclosure
Definition
📄️ control-authority
Definition
📄️ controller
Definition
📄️ cooperative-delegation
Definition
📄️ coroutines
Definition
📄️ correlation
Definition
📄️ count-code
See
📄️ credential
Definition
📄️ crypto-libraries
Definition
📄️ cryptocurrency
Definition
📄️ cryptographic-commitment-scheme
Definition
📄️ cryptographic-primitive
Definition
📄️ cryptographic-strength
Definition
📄️ cryptonym
Definition
📄️ current-threshold
Definition
📄️ custodial-agent
Definition
📄️ custodial-rotation
Definition
📄️ data-anchor
Definition
📄️ dead-attack
Definition
📄️ dead-drop
Definition
📄️ decentralized-identifier
Definition
📄️ decentralized-identity
Definition
📄️ decentralized-key-management-infrastructure
Definition
📄️ delegated-identifier
Definition
📄️ delegation
Definition
📄️ derivation-code
Definition
📄️ designated-aliases
Definition
📄️ designated-authorized-representative
Definition
📄️ diger
Definition
📄️ digest
Definition
📄️ digital-signature
Definition
📄️ dip
Definition
📄️ direct-mode
Definition
📄️ directed-acyclic-graph
Definition
📄️ disclosee
Definition
📄️ discloser
Definition
📄️ discovery
Definition
📄️ distributed-hash-table
Definition
📄️ dnd
Definition
📄️ domain-name
Definition
📄️ domain
Definition
📄️ double-spend-proof
Definition
📄️ drt
Definition
📄️ dual-indexed-codes
Definition
📄️ dual-text-binary-encoding-format
Definition
📄️ duplicitous-event-log
Definition
📄️ duplicity-detection
Definition
📄️ duplicity
Definition
📄️ eclipse-attack
Definition
📄️ edge
Definition
📄️ electronic-signature
Definition
📄️ encrypt-sender-sign-receiver
Definition
📄️ end-role
Definition
📄️ end-to-end
Definition
📄️ end-verifiability
a data item or statement may be cryptographically securely attributable to its source (party at the source end) by any recipient verifier (party at the destination end) without reliance on any infrastructure not under the verifier’s ultimate control.
📄️ end-verifiable
Definition
📄️ engagement-context-role
Definition
📄️ entity
See
📄️ entropy
Definition
📄️ ephemeral
Definition
📄️ escrow-state
Definition
📄️ escrow
Definition
📄️ establishment-event
Definition
📄️ exn
Definition
📄️ exp
Definition
📄️ extensible-business-reporting-language
Definition
📄️ field-map
Definition
📄️ first-seen
Definition
📄️ foreign-function-interface
Definition
📄️ frame-code
See
📄️ framing-code
Definition
📄️ full-disclosure
Definition
📄️ fully-compact
definition
📄️ fully-expanded
Definition
📄️ ghost-credential
Definition
📄️ gleif-authorized-representative
Definition
📄️ gnu-privacy-guard
Definition
📄️ governance-framework
Definition
📄️ graduated-disclosure
Definition
📄️ graph-fragment
Definition
📄️ group-code
See
📄️ group-framing-code
Definition
📄️ hab
Definition
📄️ habery
Definition
📄️ hardware-security-module
Definition
📄️ hierarchical-asynchronous-coroutines-and-input-output
Definition
📄️ hierarchical-composition
Definition
📄️ hierchical-deterministic-keys
Definition
📄️ hio
Definition
📄️ icp
Definition
📄️ identifier-system
Definition
📄️ identifier
Definition
📄️ identity-assurance
Definition
📄️ identity
Definition
📄️ inception-event
Definition
📄️ inception
Definition
📄️ inconsistency
Definition
📄️ indexed-signature
Definition
📄️ indirect-mode
Definition
📄️ information-theoretic-security
Definition
📄️ input-output
Definition
📄️ inquisitor
Definition
📄️ integrity
Definition
📄️ interaction-event
Non-establishment Event that anchors external data to the key-state as established by the most recent prior establishment event.
📄️ interactive-authentication-design
Definition
📄️ interceptor
Definition
📄️ interleaved-serialization
Definition
📄️ internal-inconsistency
Definition
📄️ internet-assigned-numbers-authority
Definition
📄️ interoperability
Definition
📄️ interoperable
See
📄️ ip-address
An Internet Protocol address (IP address) is a numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: network interface identification) and location addressing.
📄️ iss
Definition
📄️ issuance-and-presentation-exchange-protocol
Definition
📄️ issuance-event
Definition
📄️ issuance-exchange
Definition
📄️ issuee
Definition
📄️ issuer
Definition
📄️ ixn
Definition
📄️ javascript-object-notation
Definition
📄️ javascript-object-signing-and-encryption
Definition
📄️ judge
Definition
📄️ juror
Definition
📄️ jury
Definition
📄️ keep
Definition
📄️ keri-agreement-algorithm-for-control-establishment
Definition
📄️ keri-command-line-interface
Definition
📄️ keri-event-stream
Definition
📄️ keri-improvement-doc
Definition
📄️ keri-ox
Definition
📄️ keri-request-authentication-method
Definition
📄️ keri-suite-search-engine
Definition
📄️ keri-suite
Definition
📄️ keria
Definition
📄️ keride
Definition
📄️ keridemlia
Definition
📄️ kerific
Definition
📄️ keripy
Definition
📄️ keri’s-algorithm-for-witness-agreement
Definition
📄️ kever
Definition
📄️ key-compromise
Definition
📄️ key-event-log
Definition
📄️ key-event-message
Definition
📄️ key-event-receipt-infrastructure
Definition
📄️ key-event-receipt-log
Definition
📄️ key-event-receipt
Definition
📄️ key-event
Definition
📄️ key-management
Definition
📄️ key-pair
Definition
📄️ key-state
Definition
📄️ key-stretching
Definition
📄️ key-transparency
Definition
📄️ key
Definition
📄️ keystore
Definition
📄️ kli
See
📄️ ksn
Definition
📄️ large-language-model
Definition
📄️ lead-bytes
Definition
📄️ ledger-backer
Definition
📄️ legal-entity-engagement-context-role-vlei-credential-governance-framework
Definition
📄️ legal-entity-official-organizational-role-vlei-credential-governance-framework
Definition
📄️ legal-entity-vlei-credential-governance-framework
Definition
📄️ legal-entity
Definition
📄️ legitimized-human-meaningful-identifier
Definition
📄️ levels-of-assurance
Definition
📄️ listed-identifier
Definition
📄️ live-attack
Definition
📄️ liveness
Definition
📄️ loci-of-control
Definition
📄️ locked-state
Definition
📄️ management-TEL
See
📄️ management-transaction-event-log
Definition
📄️ media-type
Definition
📄️ message
Definition
📄️ messagepack
Definition
📄️ moobi
Definition
📄️ most-compact
Definition
📄️ multi-factor-authentication
Definition
📄️ multi-valent
Definition
📄️ multicodec
Definition
📄️ multiplexing
Definition
📄️ multisig
Definition
📄️ naive-conversion
Definition
📄️ namespace
Definition
📄️ ndigs
Definition
📄️ nested-cooperative-delegated-identifiers
Definition
📄️ next-threshold
Definition
📄️ non-establishment-event
Definition
📄️ non-fungible-token
Definition
📄️ non-interactive-authentication-design
Definition
📄️ non-normative
Definition
📄️ non-repudiable
Definition
📄️ non-transferable-identifier
Definition
📄️ non-transferable
Definition
📄️ normative
Definition
📄️ official-organizational-role
Definition
📄️ one-way-function
Definition
📄️ opcode
Definition
📄️ operator
Definition
📄️ out-of-band-introduction
Definition
📄️ owner
See
📄️ ownership
See
📄️ pad
Definition
📄️ parside
Definition
📄️ partial-disclosure
Definition
📄️ partial-pre-rotation
See
📄️ partial-rotation
Definition
📄️ party
Definition
📄️ passcode
Definition
📄️ pathing
Definition
📄️ payload
Definition
📄️ peer-to-peer
Definition
📄️ percolated-discovery
a discovery mechanism for information associated with an AID or a SAID, which is based on Invasion Percolation Theory. Once an entity has discovered such information, it may in turn share what it discovers with other entities. Since the information so discovered is end-verifiable, the percolation mechanism and percolating intermediaries do not need to be trusted.
📄️ percolated-information-discovery
Definition
📄️ perfect-security
a special case of Information theoretic security ITPS.
📄️ persistent-data-structure
Definition
📄️ persistent-identifier
See
📄️ pii
Definition
📄️ pipelining
Definition
📄️ post-pad
Definition
📄️ post-quantum
Definition
📄️ pre-pad
Definition
📄️ pre-rotation
Definition
📄️ prefix
Definition
📄️ presentation-exchange
Definition
📄️ pretty-good-privacy
Definition
📄️ primary-root-of-trust
Definition
📄️ primitive
Definition
📄️ privacy-washing
Definition
📄️ privacy
Definition
📄️ proem
Definition
📄️ promiscuous-mode
Definition
📄️ proof-of-authority
Definition
📄️ proof-of-authorship
Definition
📄️ protocol
Definition
📄️ provenance
Defintion
📄️ provenanced
Definition
📄️ pseudo-random-number
Definition
📄️ public-key-infrastructure
Definition
📄️ public-transaction-event-log
Definition
📄️ public-verifiable-credential-registry
Definition
📄️ qry
Definition
📄️ quadlet
Definition
📄️ qualified-vlei-issuer-vlei-credential-governance-framework
Definition
📄️ qualified-vlei-issuer
Definition
📄️ qualified
Definition
📄️ qvi-authorized-representative
A designated representative of a QVI authorized, to conduct QVI operations with GLEIF and Legal Entities. Also referring to a person in the role of a QAR.
📄️ race-condition
Definition
📄️ rainbow-table-attack
Definition
📄️ rct
Definition
📄️ read-update-nullify
Definition
📄️ receipt-log
Definition
📄️ receipt
Definition
📄️ reconciliation
Definition
📄️ redundant-credential
Definition
📄️ registrar
Definition
📄️ registration-interaction
Definition
📄️ registry
Definition
📄️ replay-attack
Definition
📄️ repo
Definition
📄️ reputation
Definition
📄️ reputational-trust
Definition
📄️ reserve-rotation
Definition
📄️ rev
Definition
📄️ revocation-event
Definition
📄️ revocation
Definition
📄️ ricardian-contract
Definition
📄️ root-autonomic-identifier
Definition
📄️ root-of-trust
Definition
📄️ rot
Definition
📄️ rotation-authority
Definition
📄️ rotation-event
Definition
📄️ rotation
Definition
📄️ rpy
Definition
📄️ rules
a top-level field map within an ACDC that provides a legal language as a Ricardian Contract, which is both human and machine-readable and referenceable by a cryptographic digest.
📄️ run-off-the-crud
Definition
📄️ sally
Definition
📄️ salt
Definition
📄️ salter
Definition
📄️ salty-nonce-blinding-factor
Definition
📄️ schema-namespace-registry
Definition
📄️ schema-registry
Definition
📄️ schema
the SAID of a JSON schema that is used to issue and verify an ACDC.
📄️ seal
Definition
📄️ secondary-root-of-trust
Definition
📄️ secure-asset-transfer-protocol
Definition
📄️ secure-attribution
Definition
📄️ secure-private-authentic-confidentiality
Definition
📄️ secure
See
📄️ security-cost-performance-architecture-trade-off
Definition
📄️ security-overlay-properties-trillema
Definition
📄️ security
Definition
📄️ seed
Definition
📄️ selective-disclosure
Definition
📄️ self-addressed-data
Definition
📄️ self-addressing-data
Definition
📄️ self-addressing-identifier
Definition
📄️ self-authenticating
See
📄️ self-certifying-identifier
Definition
📄️ self-framing
Definition
📄️ self-sovereign-identity
Definition
📄️ self-sovereignty
See
📄️ semver
Semantic Versioning Specification 2.0. See also (https//semver.org/].
📄️ server-sent-event
Definition
📄️ service-endpoint
Definition
📄️ siger
See
📄️ signed-digest
Definition
📄️ signer
Definition
📄️ signify-keria-request-authentication-protocol
Definition
📄️ signify
Definition
📄️ signing-authority
Definition
📄️ signing-threshold
Definition
📄️ simple-keri-for-web-auth
Definition
📄️ single-signature-identifier
Definition
📄️ sniffable
Definition
📄️ sniffer
Definition
📄️ solicited-issuance
Definition
📄️ source-of-truth
Definition
📄️ spanning-layer
Definition
📄️ spurn
Definition
📄️ ssi-system
Definition
📄️ stable
Definition
📄️ stale-event
Definition
📄️ stale-key
Definition
📄️ stream
Definition
📄️ streamer
Definition
📄️ strip-parameter
Definition
📄️ sub-shell
Definition
📄️ supermajority
Definition
📄️ targeted-acdc
an ACDC with the presence of the Issuee field in the attribute or attribute aggregate sections.
📄️ tcp-endpoint
Definition
📄️ text-binary-concatenation-composability
Definition
📄️ tholder
Definition
📄️ threshold-of-accountable-duplicity
Definition
📄️ threshold-signature-scheme
Definition
📄️ threshold-structure-security
Definition
📄️ top-level-section
Definition
📄️ trans-contextual-value
Definition
📄️ transaction-event-log
Definition
📄️ transfer-off-ledger
Definition
📄️ transferable-identifier
Definition
📄️ transferable
Definition
📄️ transmission-control-protocol
Definition
📄️ tritet
3 bits. See Performant resynchronization with unique start bits.
📄️ trust-domain
Definition
📄️ trust-spanning-protocol
Definition
📄️ trusted-execution-environment
Definition
📄️ trusted-platform-module
Definition
📄️ ts-node
Definition
📄️ uniform-resource-locator
Definition
📄️ univalent
Definition
📄️ unpermissioned-correlation
a correlation established between two or more disclosed ACDCs whereby the discloser of the ACDCs does not permit the disclosee to establish such a correlation.
📄️ unsolicited-issuance
Definition
📄️ untargeted-acdc
an ACDC without the presence of the Issuee field in the attribute or attribute aggregate sections.
📄️ user-interface
Definition
📄️ vLEI
See
📄️ validate
Definition
📄️ validator
Definition
📄️ variable-length
a type of count code allowing for vaiable size signatures or attachments which can be parsed to get the full size.
📄️ vcp
Definition
📄️ vdr
See
📄️ veracity
Definition
📄️ verfer
Definition
📄️ verifiable-credential
Definition
📄️ verifiable-data-registry
Definition
📄️ verifiable-data-structure
Definition
📄️ verifiable-identifier
Definition
📄️ verifiable-legal-entity-identifier
Definition
📄️ verifiable
Definition
📄️ verification
Definition
📄️ verified-integrity
Definition
📄️ verifier
Definition
📄️ verify-signature
Definition
📄️ verify
Definition
📄️ version-code
Definition
📄️ version-string
Definition
📄️ version
Definition
📄️ virtual-credential-transaction-event-log
Definition
📄️ virtual-credential
Definition
📄️ vlei-credential
Definition
📄️ vlei-ecosystem-governance-framework
Definition
📄️ vlei-role-credential
Definition
📄️ vrt
Definition
📄️ wallet
Definition
📄️ watcher
Definition
📄️ web-of-trust
Definition
📄️ weight-of-weights
Definition
📄️ weight
an optional field map in the Edge section that provides edge weight property that enables directed weighted edges and operators that use weights.
📄️ well-known-witnesses
Definition
📄️ witness
Definition
📄️ xip
Definition
📄️ zero-trust-computing
Definition
📄️ zero-trust
Definition