LIVRE OS ยท Core Identity Layer
1. Purpose & Scope
Key Management defines how LIVRE OS handles:
- generation
- derivation
- rotation
- backup
- recovery
- ephemeral proof keys
- device binding
All security, sovereignty, and privacy in LIVRE OS depends on the correctness of its key system.
This document describes:
- the Key Hierarchy
- constraints
- entropy sources
- recovery methods
- operational key rules
- integration with Solivre Kernel and Proof Engine
2. Design Principles
- User-sovereign: keys are always user-owned.