Elydora Acknowledgement Receipt (EAR)

The EAR is Elydora's server-side attestation that an operation was received, validated, sequenced, and permanently recorded. It is signed by Elydora's own Ed25519 key.

Structure

FieldTypeRequiredDescription
receipt_versionnumberYesReceipt format version. Currently 1.
receipt_idstringYesUnique identifier for this receipt.
operation_idstringYesThe operation ID this receipt acknowledges.
org_idstringYesOrganization identifier.
agent_idstringYesAgent that submitted the operation.
server_received_atstringYesISO 8601 timestamp of server receipt.
seq_nonumberYesGlobal sequence number within the organization.
chain_hashstringYesThe computed chain hash after this operation.
queue_message_idstringYesInternal message queue ID for traceability.
receipt_hashstringYesSHA-256 hash of the canonical receipt (excluding Elydora signature).
elydora_kidstringYesKey ID of Elydora's signing key used for this receipt.
elydora_signaturestringYesEd25519 signature by Elydora over the receipt_hash.

Example EAR

json
{
  "receipt_version": 1,
  "receipt_id": "rcpt_xyz789",
  "operation_id": "550e8400-e29b-41d4-a716-446655440000",
  "org_id": "org_acme",
  "agent_id": "agent_underwriter",
  "server_received_at": "2026-02-28T14:00:01Z",
  "seq_no": 42,
  "chain_hash": "sha256:ghi789...",
  "queue_message_id": "msg_001",
  "receipt_hash": "sha256:receipt_hash_abc...",
  "elydora_kid": "elydora-signing-key-001",
  "elydora_signature": "base64:elydora-ed25519-sig..."
}

Independent Verification

The EAR can be verified independently using Elydora's public keys from the JWKS endpoint:

Properties