{"id":"https://openalex.org/W7148400932","doi":"https://doi.org/10.48550/arxiv.2604.00151","title":"Source Known Identifiers: A Three-Tier Identity System for Distributed Applications","display_name":"Source Known Identifiers: A Three-Tier Identity System for Distributed Applications","publication_year":2026,"publication_date":"2026-03-31","ids":{"openalex":"https://openalex.org/W7148400932","doi":"https://doi.org/10.48550/arxiv.2604.00151"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.00151","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00151","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.00151","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132793626","display_name":"Duran Serkan K\u0131l\u0131\u00e7","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"K\u0131l\u0131\u00e7, Duran Serkan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5132793626"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.16290000081062317,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.16290000081062317,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.1143999993801117,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.09210000187158585,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.7739999890327454},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4702000021934509},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.45329999923706055},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.44209998846054077},{"id":"https://openalex.org/keywords/timestamp","display_name":"Timestamp","score":0.4343999922275543},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.3752000033855438},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.3515999913215637},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.35100001096725464},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.3334999978542328}],"concepts":[{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.7739999890327454},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7735999822616577},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4702000021934509},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.45329999923706055},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4512999951839447},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.44209998846054077},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.4343999922275543},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.3752000033855438},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3515999913215637},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.35100001096725464},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3334999978542328},{"id":"https://openalex.org/C159254197","wikidata":"https://www.wikidata.org/wiki/Q1144915","display_name":"Lexicographical order","level":2,"score":0.3328999876976013},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.3149999976158142},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.31200000643730164},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.30959999561309814},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30489999055862427},{"id":"https://openalex.org/C119839945","wikidata":"https://www.wikidata.org/wiki/Q6545185","display_name":"Unique identifier","level":3,"score":0.2921000123023987},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.288100004196167},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.2639999985694885},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.2637999951839447},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.25949999690055847},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.2533000111579895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25200000405311584}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.00151","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00151","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.00151","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00151","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.6883947849273682,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Distributed":[0],"applications":[1],"need":[2],"identifiers":[3],"that":[4,52,167],"satisfy":[5],"storage":[6,100],"efficiency,":[7],"chronological":[8,169],"sortability,":[9],"origin":[10],"metadata":[11],"embedding,":[12],"zero-lookup":[13,150],"verifiability,":[14],"confidentiality":[15],"for":[16,107],"external":[17],"consumers,":[18],"and":[19,86,103,140,156],"multi-century":[20],"addressability.":[21],"Based":[22],"on":[23],"our":[24],"literature":[25],"survey,":[26],"no":[27],"existing":[28],"scheme":[29],"provides":[30],"all":[31,62,215],"six":[32,63],"of":[33,152],"these":[34],"identifier":[35,153],"properties":[36],"within":[37,159],"a":[38,48,54,73,78,81,87,123,141,163,190],"unified":[39],"system.":[40],"This":[41],"paper":[42],"introduces":[43],"Source":[44,68,114],"Known":[45,69,115],"Identifiers":[46],"(SKIDs),":[47],"three-tier":[49],"identity":[50,57],"system":[51],"projects":[53],"single":[55],"entity":[56,134,157],"across":[58],"trust":[59],"boundaries,":[60],"addressing":[61],"properties.":[64],"The":[65,111,176],"first":[66],"tier,":[67,113,178],"ID":[70,117],"(SKID),":[71],"is":[72],"64-bit":[74],"signed":[75],"integer":[76],"embedding":[77],"timestamp":[79],"with":[80,162,203],"250-millisecond":[82],"precision,":[83],"application":[84],"topology,":[85],"per-entity-type":[88],"sequence":[89],"counter.":[90],"It":[91],"serves":[92],"as":[93,189],"the":[94,120,182],"database":[95,109],"primary":[96],"key,":[97],"providing":[98],"compact":[99],"(8":[101],"bytes)":[102],"natural":[104],"B-tree":[105],"ordering":[106,170],"optimized":[108],"indexing.":[110],"second":[112],"Entity":[116],"(SKEID),":[118],"extends":[119],"SKID":[121],"into":[122],"128-bit":[124],"Universally":[125],"Unique":[126],"Identifier":[127],"(UUID)":[128],"compatible":[129,202],"value":[130],"by":[131],"adding":[132],"an":[133,137],"type":[135,158],"discriminator,":[136],"epoch":[138],"selector,":[139],"BLAKE3":[142],"keyed":[143],"message":[144],"authentication":[145],"code":[146],"(MAC).":[147],"SKEIDs":[148],"enable":[149],"verification":[151],"origin,":[154],"integrity,":[155],"trusted":[160],"environments,":[161],"big-endian":[164],"byte":[165],"layout":[166],"preserves":[168],"in":[171,208],"lexicographic":[172],"UUID":[173,205],"string":[174,209],"comparisons.":[175],"third":[177],"Secure":[179],"SKEID,":[180],"encrypts":[181],"entire":[183],"SKEID":[184],"using":[185],"AES-256":[186],"symmetric":[187],"encryption":[188],"single-block":[191],"pseudorandom":[192],"permutation,":[193],"producing":[194],"ciphertext":[195],"indistinguishable":[196],"from":[197],"random":[198],"bytes":[199],"while":[200],"remaining":[201],"standard":[204],"data-type":[206],"parsers":[207],"representation.":[210],"Deterministic":[211],"bidirectional":[212],"transformations":[213],"connect":[214],"three":[216],"tiers.":[217]},"counts_by_year":[],"updated_date":"2026-04-03T16:44:17.987007","created_date":"2026-04-03T00:00:00"}
