KID0000 - Glossary, overview, how to use - Commentary

Back to table of contents
Link |
Commentary |
Section |
0000 |
X |
Glossary, overview, how to use |
0001 |
X |
Prefixes, Derivation and derivation reference tables |
0002 |
X |
Data model (field & event concepts and semantics) |
0003 |
X |
Serialization |
0004 |
X |
Key Configuration (Signing threshold & key set) |
0005 |
X |
Next Key Commitment (Pre-Rotation) |
0006 |
X |
Seals |
0007 |
X |
Delegation (pending PR by Sam) |
0008 |
X |
Key-Event State Machine |
0009 |
X |
Indirect Mode & Witnesses |
0010 |
|
Recovery/consensus Algorithm (KAACE) |
0010 |
|
Database & Storage Considerations |
0097 |
n/a |
Non-Normative Implementation Guidance |
0098 |
n/a |
Use Cases |
0099 |
n/a |
Test Vectors and Normative Statement Index |
- jan 5 notes
- KID0000 - Glossary, overview, how to use {Leave for later}
- High-Level overview of Operating Modes (Direct, Indirect, Ephemeral)
- Dainty and Narrow Scope
- Dependency/RFC List (the thorax between the KERI neck and the IP waist): base64, messagePack, CBOR & JSON, ECC Dig Sigs, [128+] Cr. Digests, Messaging: UDP/TCP/HTTP (for now), standard HEX alphabet RFC
- {Note to self: review this}
- Implementation guide: explanation of higher-level behavior assumptions codified into test suites
- KID0000Comment - Mental models & big-picture rationale
- Intro to SCIDs? (Whitepaper 2.3)
- {Include link to Unified Identifier whitepaper}
- Cryptographic Trust Basis (Whitepaper 2.4)
- Autonomic Namespace (Whitepaper 3.1) & Syntax (3.2)
- Unified Identifier Model (3.3)
- KERI "Layering" and Scope
- Explanation of VCs, VC-Auth/Capabilities, etc.
- Out of scope but useful if specified: Assumptions one layer up
- link to Authentic Chained Data Container spec at ToIP