Skip to content



This section is incomplete and will soon be updated.

The AEAs currently use the addresses associated with their private-public key pairs to identify themselves.

Keys of an AEA

To learn how to generate a private-public key pair check out the relevant CLI commands .

To learn more about public-key cryptography check out Wikipedia.

An AEA can provide evidence of its identity using third-party solutions. We have implemented a demo using Aries Hyperledger Cloud Agent which is available here and another demo using Yoti which is available here.