[HDP] Agentic delegation provenance with DID principal binding

Hi Credentials CG Team,



I'd like to share a protocol that addresses a gap in the agentic AI space that I believe is directly relevant to this group's work on Verifiable Credentials and decentralized identity.



HDP (Human Delegation Provenance Protocol) defines a signed token chain that creates a cryptographic audit trail from an authorising human to every AI agent acting downstream. 

The principal identity model supports id_type: "did" natively, meaning a W3C DID can be used as the root authorising identity binding HDP delegation chains to existing decentralised identity infrastructure.



IETF draft: https://datatracker.ietf.org/doc/draft-helixar-hdp-agentic-delegation/ 

Spec:       https://helixar.ai/about/labs/hdp/ 

Repository: https://github.com/Helixar-AI/HDP 



Key properties:

- Ed25519 signatures over RFC 8785 canonical JSON

- Fully offline verification, no registry or network dependency

- DID-compatible principal binding at the root token level

- Compact enough for HTTP header transport (X-HDP-Token)



I see a natural alignment between HDP's delegation model and the VC data model, specifically around how an AI agent's authority could be expressed as a Verifiable Presentation derived from the root delegation token.

I'm actively exploring this in the next draft revision and would welcome input from this group on how best to formalise that binding.



Happy to answer questions or take feedback on the draft.



Best regards,

Siri
Helixar Limited

Received on Monday, 30 March 2026 19:57:44 UTC