This reference defines the identifiers that appear in Aura documents. Every other document should reuse these definitions instead of restating partial variants. Each identifier preserves structural privacy by design.
Journal namespace for an authority. Does not leak operator or membership metadata. All public keys, commitment trees, and attested operations reduce under this namespace.
DeviceId
Uuid
Device within a threshold account. Each device holds shares of the root key. Visible only inside the authority namespace.
LocalDeviceId
u32
Compact internal device identifier for efficiency. Never appears in cross-authority communication.
GuardianId
Uuid
Social recovery guardian. Does not reveal the guardian's own authority structure.
AccountId
Uuid
Legacy identifier being replaced by AuthorityId. Exists for backward compatibility.
Relational context or derived subcontext. Opaque on the wire, appears only inside encrypted envelopes and receipts. Never encodes participant lists or roles. Flow budgets and leakage metrics scope to (ContextId, peer) pairs.
SessionId
Uuid
Choreographic protocol execution instance. Pairs a ContextId with a nonce. Not long-lived; expires when protocol completes or times out.
DkdContextId
{ app_label: String, fingerprint: [u8; 32] }
Deterministic Key Derivation context. Combines application label with fingerprint to scope derived keys across application boundaries.
Consensus instance identifier derived from prestate hash, operation hash, and nonce. Binds operations to prestates through hash commitment. See Consensus.
FrostParticipantId
NonZeroU16
Threshold signing participant. Must be non-zero for FROST protocol compatibility. Scoped to signing sessions.
Receipt is the accountability record emitted by FlowGuard. It contains context, source authority, destination authority, epoch, cost, nonce, chained hash, and signature. Receipts prove that upstream participants charged their budget before forwarding. No receipt includes device identifiers or user handles.
Aura derives per-context cryptographic keys from reduced account state and ContextId. Derived keys never surface on the wire. They only exist inside effect handlers to encrypt payloads, generate commitment tree secrets, or run DKD.
The derivation inputs never include device identifiers. Derived keys inherit the privacy guarantees of AuthorityId and ContextId. The derivation function uses derive(account_root, app_id, context_label) and is deterministic but irreversible.