← Articles
A2A Security February 13, 2026

A2A Cryptographic Identity Verification: Trust at the Protocol Layer

A new proposal addresses a fundamental gap in agent-to-agent communication: how do autonomous systems verify each other's identity before delegating sensitive tasks?

Contributor

imran-siddique — An active A2A contributor focused on security infrastructure. Previous contributions include the Agent-Mesh Trust Layer proposal for decentralized identity verification. GitHub →

The Problem

As the A2A protocol matures toward 1.0, a critical security gap remains: agents can communicate with each other, but there's no standard way to cryptographically verify who they're communicating with. In a world where agents will increasingly delegate tasks to other agents — booking flights, transferring funds, accessing sensitive data — this identity problem becomes existential.

Without cryptographic identity verification:

The Proposal

Issue #1472 proposes adding cryptographic identity verification directly to the A2A protocol. The core idea: agents should be able to present verifiable credentials that prove their identity, capabilities, and authorization — similar to how TLS certificates work for web servers, but tailored for autonomous agent scenarios.

Key elements of the proposal:

Technical Approach

The proposal builds on established cryptographic standards rather than inventing new primitives:

// Example: Agent identity in A2A message
{
  "agent": {
    "id": "urn:a2a:agent:booking-service-alpha",
    "certificate": "-----BEGIN CERTIFICATE-----...",
    "capabilities": [
      {
        "type": "travel_booking",
        "constraints": {"max_price": "5000 USD"},
        "attestation": "signed-by-issuer..."
      }
    ],
    "delegation_chain": [
      {"from": "urn:a2a:agent:travel-corp", "signature": "..."}
    ]
  }
}

The proposal deliberately avoids blockchain-based solutions, citing complexity and latency concerns. Instead, it leverages existing PKI infrastructure while adding agent-specific extensions.

Why This Matters Now

The timing is significant. A2A 1.0 is imminent, and features added now become foundational. Adding cryptographic identity later would require breaking changes or awkward compatibility layers.

Several parallel developments make this proposal especially relevant:

🔮 Implications & Next Steps

Community Reception

The proposal is new (filed February 13), but early signals are positive. The A2A TSC has been receptive to security-focused proposals, and this aligns with the Extension Governance Framework discussions about how to handle cross-cutting concerns.

Potential challenges include: