Skip to content

Commit

Permalink
fix lint
Browse files Browse the repository at this point in the history
  • Loading branch information
m00sey committed Sep 8, 2023
1 parent ea3c425 commit f8d6dc5
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion draft-ssmith-keri.md
Original file line number Diff line number Diff line change
Expand Up @@ -461,7 +461,7 @@ informative:

This document presents identity system-based secure overlay for the Internet. This system is based on a Key Event Receipt Infrastructure (KERI) or the KERI protocol {{KERI}}{{KERI-ID}}{{RFC0791}}. The primary key management operation is key Rotation (transference) via a novel key pre-rotation scheme as the background for the acronym KERI. {{DAD}}{{KERI}}.

The identity system-based secure overlay for the Internet, based on KERI includes a primary root-of-trust in Self-certifying identifiers (SCIDs) {{UIT}}{{SCPK}}{{SFS}}{{SCPN}}{{SCURL}}. This root-of-trust presents a formalism for Autonomic identifiers (AIDs) and Autonomic namespaces (ANs). They are part of an Autonomic identity system (AIS). This system uses the design principle of minimally sufficient means to provide a candidate trust spanning layer for the internet. Associated with this system is a Decentralized key management infrastructure (DKMI).
The identity system-based secure overlay for the Internet, based on KERI includes a primary root-of-trust in Self-certifying identifiers (SCIDs) {{UIT}}{{SCPK}}{{SFS}}{{SCPN}}{{SCURL}}. This root-of-trust presents a formalism for Autonomic identifiers (AIDs) and Autonomic namespaces (ANs). They are part of an Autonomic identity system (AIS). This system uses the design principle of minimally sufficient means to provide a candidate trust spanning layer for the internet. Associated with this system is a Decentralized key management infrastructure (DKMI).

The primary root-of-trust are SCIDs that are strongly bound at issuance to a cryptographic signing (public, private) keypair which is self-contained until/unless control needs to be transferred to a new keypair. In that event, an append-only chained Key event log (KEL) of signed transfer statements provides end verifiable control provenance. This makes intervening operational infrastructure replaceable because the event logs may be served up by any infrastructure including ambient infrastructure. End Verifiable logs on ambient infrastructure enable ambient verifiability (Verifiable by anyone, anywhere, at any time).

Expand Down

0 comments on commit f8d6dc5

Please sign in to comment.