hotelgasil.blogg.se

T.n.t. acdc covers
T.n.t. acdc covers















T.n.t. acdc covers code#

A field may be represented by a framing code or block delimited serialization. We call this nested set of fields a nested field map or simply a nested map for short. Field maps may be nested where a given field value is itself a reference to another field map. We qualify this terminology when necessary by using the term field map to reference such a mapping. These pairs can be represented by two tuples e.g (label, value). To avoid confusion with the cryptographic use of the term key we instead use the term field to refer to a mapping pair and the terms field label and field value for each member of a pair.

t.n.t. acdc covers

ACDC FieldsĪn ACDC may be abstractly modeled as a nested key: value mapping. The anchored data is thereby equivalently authenticated or authorized by the chain of ACDCs. The data contained in an ACDC may therefore be merely its equivalent anchoring digest. ACDCs leverage this property to enable compact chains of ACDCs that anchor data via digests. (See the appendix for a discussion of cryptographic strength and security)Īn important property of high-strength cryptographic digests is that a verifiable cryptographic commitment (such as a digital signature) to the digest of some data is equivalent to a commitment to the data itself. These operations when used in an ACDC MUST have a security level, cryptographic strength, or entropy of approximately 128 bits. The ACDC specification (including its partial and selective disclosure mechanisms) leverages two primary cryptographic operations namely digests and digital signatures 51]. ACDCs enable securely-attributed and privacy-protecting knowledge graphs. Thus they may be used to construct knowledge graphs expressed as property graphs 64. Therefore ACDCs provide the critical enabling facility for an authentic data economy and by association an authentic real (twinned) economy.ĪCDCs act as securely attributed (authentic) fragments of a distributed property graph (PG) 62. Furthermore, any physical supply chain may be measured, monitored, regulated, audited, and/or archived by a data supply chain acting as a digital twin 57. This is a vital facility for authentic data supply chains. Chained ACDCs may provide delegated credentials.Ĭhains of ACDCs that merely provide proof-of-authorship (authenticity) of data may be appended to chains of ACDCs that provide proof-of-authority (delegation) to enable verifiable delegated authorized authorship of data. Appropriately structured ACDCs may be used as credentials when their semantics provide verifiable evidence of authority. The dictionary definition of credential is evidence of authority, status, rights, entitlement to privileges, or the like. A chained (treed) proof-of-authority enables delegation of authority and delegated authorizations. A proof-of-authority may be used to provide verifiable authorizations or permissions or rights or credentials. With a little additional syntactic sugar, this primary facility of chained (treed) proof-of-authorship (authenticity) is extensible to a chained (treed) verifiable authentic proof-of-authority (proof-of-authorship-of-authority). Similar to the concept of a chain-of-custody, ACDCs provide a verifiable chain of proof-of-authorship of the contained data. The primary purpose of the ACDC protocol is to provide granular provenanced proof-of-authorship (authenticity) of their contained data via a tree or chain of linked ACDCs (technically a directed acyclic graph or DAG). Some of the major distinguishing features of ACDCs include normative support for chaining, use of composable JSON Schema, multiple serialization formats (JSON, CBOR, MGPK, and CESR), compact formats, support for Ricardian contracts, a well defined security model derived from KERI, support for chain-link confidentiality, simple partial disclosure mechanisms and simple selective disclosure mechanisms. These include CESR, SAID, PTEL, CESR-Proof, IPEX, and did:keri. ACDCs are dependent on a suite of related IETF focused standards associated with the KERI (Key Event Receipt Infrastructure) specification.

t.n.t. acdc covers

The VC specification depends on the W3C DID (Decentralized IDentifier) specification. An ACDC is a variant of the W3C Verifiable Credential (VC) specification. GLEIF is the Global Legal Entity Identifier Foundation. A major use case for the ACDC specification is to provide GLEIF vLEIs (verifiable Legal Entity Identifiers). An authentic chained data container (ACDC) is an IETF internet draft focused specification being incubated at the ToIP (Trust over IP) foundation.















T.n.t. acdc covers