SSI & KERI

KERI is part of the SSI ecosystem, but it isn’t owned by SSI.**
It’s a foundational identity and trust layer that SSI systems can use to manage identifiers, keys, and credentials without relying on a blockchain.

What is SSI?

SSI systems generally require:

  1. Identifiers
    Secure, persistent identifiers for people, orgs, and devices.

  2. Verifiable Data
    A way to issue and verify claims/credentials.

  3. Trust Infrastructure
    A mechanism for validating key history, rotation, and integrity without a central provider.

Traditional SSI relies on:

Where KERI Fits

KERI (Key Event Receipt Infrastructure) provides a decentralized, portable trust layer for identifier and key management.
It supplies features that classical DID methods don’t:

In SSI terms:

Interoperability With SSI Standards

KERI works alongside or instead of other SSI components:

You can use KERI as:

Mental Model

Both are SSI — they just implement the trust layer differently.

Summary

Is KERI part of SSI?
Yes.
It’s a modern and efficient approach that gives SSI:

KERI = SSI without requiring a blockchain.

Overview Diagram

                  +-----------------------------+
                  |        SSI Ecosystem        |
                  +-----------------------------+
                            /        \
                           /          \
                          /            \
                         v              v

            +------------------+    +-------------------+
            |   Identifiers    |    | Verifiable Data   |
            |   (DIDs, AIDs)   |    | (VCs, ACDCs)      |
            +------------------+    +-------------------+
                      |                      |
                      |                      |
                      v                      v

      +---------------------------------------------------+
      |        KERI: Key Event Receipt Infrastructure     |
      |---------------------------------------------------|
      | - Self-certifying identifiers (AIDs)              |
      | - Key events (inception, rotation, delegation)    |
      | - Witnessing & receipts                           |
      | - Immutable event DAG (KEL)                       |
      | - No blockchain required                          |
      +---------------------------------------------------+
                      |
                      |
                      v

            +---------------------------+
            |       ACDC Layer          |
            |  (Authentic Chained Data) |
            | - Credentials             |
            | - Attestations            |
            | - Portable proofs         |
            +---------------------------+
                      |
                      |
                      v

              +-----------------------+
              |   Agents & Wallets    |
              | (Holders, Issuers,    |
              |  Verifiers)           |
              +-----------------------+
                      |
                      |
                      v

              +-----------------------+
              |  Applications & Use   |
              |       Cases           |
              +-----------------------+