
Alberta Buck transactions carry provably authentic identity – without exposing it. Every participant holds an ElGamal ciphertext1 of their identity, backed by a Pointcheval-Sanders rerandomizable signature2. A citizen with multiple accounts derives an independent, unlinkable credential for each – rerandomizing the signature offline – yet every credential is verifiable as issued by the same authority. At transaction time, the participant re-encrypts under the counterparty's key and produces a Chaum-Pedersen proof3 that the re-encrypted ciphertext contains the same identity as the registered credential. No one sees the plaintext.
Per-transaction verification costs ~29,000 gas (alt_bn128 scalar multiplications, no pairings). One-time credential registration costs ~235,000 gas (pairing-based PS signature check). No trusted setup.
Identity data resides in three layers: Ethereum contract storage (proof chain), the local Holochain wallet (plaintext identity, secret keys), and the Holochain DHT (encrypted identity exchange, Warrants for malfeasance detection). All proofs are permanently on-chain, so a public AMM pool operator can satisfy a regulatory subpoena months later using only their secret key and an archival node – without any counterparty's cooperation. (PDF, Text, Cryptography Example Code)
Identity with Anonymity
Every Alberta Buck account holds a cryptographically certified
identity that is invisible to observers but provably genuine to
authorized counterparties. The core design rests on three pillars:
the Identity Fountain (offline credential derivation with statistical
unlinkability), the two-channel architecture (Ethereum proof chain
plus Holochain data channel), and the agent-per-account isolation
model. Together with the bilateral approve / transfer flow,
these give citizens free transactions with verified counterparties,
let regulators recover identity under subpoena from on-chain proof
chains, and ensure that no party – including the government – can
surveil transactions at O(1) cost.
The expectation to be able to transact Alberta BUCKs in complete freedom (no one else can prevent it) and anonymity (no one else can identify the parties) is paramount. This is consistent with the expectation that one is innocent until proven guilty. Asking permission from anyone before we can buy, sell or trade is unacceptable to any free people. Anything less turns a free citizen into a serf. If the government or some regulator can lock your account and freeze you on a park bench at will, how free are you?
The expectation that I can be certain of my counterparty's identity, and that it is at least as reliable as the group(s) issuing it is also critical. Millions of financial fraud phone calls flood Albertans' phones daily, pillaging our neighbours and grand-parents, each carrying the government issued identity of the Canadian phone number it "originates" from – under the cover of regulators. Everyone involved knows where the call is coming from (the termination contract with the VoIP carrier), who is carrying it into our phone system (the VoIP carrier's contract with phone system providers), and who they are calling - except for you. Allowing arbitrary hostile groups to ravage a community under the cover of darkness has been used throughout history to subjugate free people. If the government can issue identity documents to whomever they wish, and you are forced to trust them, how free are you?
The Alberta Buck enforces these principles: the freedom to transact in privacy and peace, and the confidence that your counterparty is who they say they are.
Revealing Identity while Preserving Privacy
If I am suspected of a crime, an Alberta court can compel me to decrypt the participants in BUCK transactions they suspect are related to that crime, and reveal the identity of counterparties I've transacted with. I may resist, and face the consequences. But the organizations that Alberta tasks with overseeing the authenticity of my Alberta issued identity must not be able to simply authorize decryption of my counterparties' identities! They can only vouch for and reveal the identities they've directly issued, just as I can vouch for my daughter's – they can't decrypt arbitrary participants in each transaction.
This is how the cryptography enforces it: each re-encrypted identity is an ElGamal ciphertext under the specific counterparty's public key. Only that counterparty's private key can recover the plaintext. The identity issuer cannot decrypt it – they signed the identity, not the ciphertext; the encryption is mine alone. The government cannot decrypt it. No registry operator, no Holochain node, no subpoena served on anyone other than a direct participant can break this. A court must compel a specific participant to decrypt a specific transaction's counterparties' identity data. Every individual's credential must be attacked separately. The cost to surveil is O(N), not O(1).
The Identity Fountain
A citizen with income, savings, inheritance, and walking-around-money accounts should not have those accounts linkable to each other by any outside observer. Ethereum balances are public; if all of Alice's accounts trace back to the same identity credential, her entire financial life is exposed to anyone who notices the link.
The identity fountain solves this. It gives every citizen the ability to derive unlimited, unlinkable identity credentials – each independently verifiable as issued by the same authority – from a single KYC ceremony. The construction uses Pointcheval-Sanders (PS) rerandomizable signatures2 over the alt_bn128 curve.
Issuance: The Issuer Signs Once
During the KYC ceremony, the issuer:
- Verifies Alice's identity (documents, biometrics, whatever the jurisdiction requires).
- Computes the identity scalar
m = H(identity_data). - Picks a random point
hinG_1and computes the PS signature:sigma = (h, (x + m * y) * h)where(x, y)is the issuer's secret key. - Gives Alice the identity scalar
mand signature(sigma_1, sigma_2). - Publishes the issuance event to the issuer's Holochain source chain.
The issuer's public key (X, Y) = (x * g_2, y * g_2) in G_2 is
registered in the TrustedIssuersRegistry on Ethereum. The issuer is now
done – permanently, if desired.
What identity_data Contains
identity_data is a canonical (deterministically serialized)
structure containing Alice's verified identity claims:
identity_data = canonical_encode({
given_name: "Alice",
family_name: "Johnson",
jurisdiction: "Alberta, Canada",
id_type: "Alberta Identity Card",
id_number: "AIC-2026-4839201",
date_of_birth: "1992-03-15",
issuer_id: "atb-financial-ca",
issued_at: "2026-01-20T14:30:00Z",
epoch: 42
})
The identity scalar is m = H(identity_data) where H is
keccak256 over the canonical encoding. The canonical encoding is
deterministic: field order, encoding format, and whitespace are
fixed by the hApp DNA, so any party who holds the same
identity_data computes the same m.
The issuer verifies these claims during the KYC ceremony and
computes m. Alice receives both m (the scalar) and
identity_data (the plaintext). The plaintext never touches
Ethereum – it is the content that the on-chain proof chain
guarantees. Alice stores identity_data as a Private entry on
her Holochain source chain, encrypted with her agent key and never
published to the DHT.
Different issuers may define different schemas (a province vs. a
bank), but all schemas produce a single scalar m via the same
hash function. The epoch field binds the credential to a
renewal period (see Epoch-Based Credential Renewal below).
Derivation: Alice Generates Credentials Offline
For each new Ethereum account, Alice's Holochain wallet:
- Picks a random scalar
tand rerandomizes the PS signature:sigma' = (t * sigma_1, t * sigma_2)Thissigma'is a valid PS signature on the samemunder the same issuer public key – but is statistically unlinkable tosigmaor to any other rerandomization. No algorithm can correlatesigma'back tosigma. - Generates a fresh identity key pair
(sk_new, pk_new)on alt_bn128. - Encrypts the identity under the new key using ElGamal:
E_new = (r * G, m * G + r * pk_new) -
Computes a non-interactive zero-knowledge proof
pithatE_newencrypts the samemthatsigma'signs:"I know (m, t, r) such that: a) e(sigma'_1, X + m * Y) = e(sigma'_2, g_2) -- valid PS signature b) C = m * G + r * pk_new -- ElGamal encryption of m c) R = r * G -- consistent randomness"
- Packages
(pk_new, E_new, sigma', pi)for registration.
This derivation runs entirely on Alice's device. She can pre-generate a hundred credentials in a batch and store them in her Holochain wallet, pulling one out whenever she creates a new account.
Each credential derivation corresponds to a separate Holochain
agent. Alice's wallet spawns a new Holochain agent – a fresh
Ed25519 key pair and an independent source chain – for each
Ethereum account. From the perspective of both Ethereum and
Holochain, these agents are entirely distinct identities: separate
addresses, separate agent IDs, separate source chains. The one
artifact shared across agents is Alice's identity_data (and
therefore m = H(identity_data)), which is copied into each new
agent's Private entry store. Since m is committed only inside
ElGamal ciphertexts (IND-CPA secure) and PS signatures
(statistically rerandomized), no observer on either network can
detect that two agents share the same m.
Registration: One-Time On-Chain Verification
Alice registers the derived credential in the IdentityRegistry:
identityRegistry.registerCredential(
alice_new_address,
pk_new, // identity public key
E_new, // ElGamal ciphertext (4 uint256)
sigma_prime, // rerandomized PS signature (2 G_1 points)
pi // NIZK proof linking sigma' to E_new
)
The contract verifies the PS signature and NIZK proof using the
ecPairing precompile (address 0x08), ecMul, and ecAdd. Gas
cost: ~235,000 gas, paid once per account.
After registration, isVerified(alice_new_address) == true. The
credential is stored on-chain as an ElGamal ciphertext and an identity
public key. No subsequent operation consults the PS signature again;
per-transaction verification is pure Chaum-Pedersen (~29,000 gas).
What the World Sees
Alice creates five accounts over two years. Each registers a credential
(pk_i, E_i, sigma'_i, pi_i). An observer can verify:
- Each
sigma'_iwas produced by the known issuer – the pairing check passes. - Each
E_iencrypts the identity thatsigma'_isigns – the proofpi_iconfirms it. - Whether any two credentials belong to the same person – no.
PS rerandomization is statistically unlinkable – not merely computationally hard to correlate, but information-theoretically impossible. The credentials contain zero bits of mutual information. Alice's inheritance account, her walking-around-money account, her savings account – each carries the issuer's stamp of authenticity, each is cryptographically invisible to the others.
Epoch-Based Credential Renewal
If the issuer revokes Alice's identity (fraud, death, court order), all her derived credentials must be invalidated – without linking them.
Credentials carry an expiry epoch (e.g., one year). The issuer publishes
epoch keys; credential derivation requires the current epoch key.
Revocation means the issuer refuses to provide Alice's next epoch key.
Expired credentials are rejected at isVerified time. Alice must
periodically re-derive from a fresh issuance – giving the issuer a
natural checkpoint for continued eligibility.
This fits Alberta Buck's model: the issuer remains the trust anchor for "is this person still in good standing," which is the real-world question regardless of the cryptography.
Accounts Belong to Someone
I may be a citizen of Alberta and have a minor child. My child's identity is vouched by me, and my identity is vouched by Alberta. I have several accounts associated with encrypted copies of my identity (income, savings, etc) and several unencrypted accounts (walking-around money). I can transfer money from my savings to my walking-around account (anonymously, via my BUCK account at ATB).
My encrypted savings account identity has been authorized by ATB to send funds. My walking-around money account has a plaintext identity, so Starbucks' BUCK account doesn't need to pre-authorize incoming transactions – it accepts BUCK transfers from any BUCK account with a public identity.
This just cuts out the middleman, and gives every citizen what government and institutions already have: knowledge of the participants in transactions with public accounts. If I prefer, I can set up a Starbucks account, and ask them to authorize me to send money to them. Again, allowing with BUCKs what is already allowed with a pre-loaded Starbucks card – private transactions with a public account. Starbucks and Visa both know who paid to fund the Visa card, and who funded their Starbucks account with that card. Now, citizens can set up similar arrangements and retain that knowledge amongst themselves.
If a court compels one of the participants (for example, as the result of an arrest in a sting operation against some members of a group performing some illicit activity), then that person's transactions with other members of the group can be discovered. Otherwise: financial activity remains confidential, at the sole choice of the participants.
The expectation that any government or bank functionary – or any random attacker exploiting government or bank incompetence – can know the details of a citizen's financial activities is unacceptable. The attack cost must be O(N), not O(1): every individual's credential must be attacked separately, not extracted from one compromised custodian.
Counterparties Exchange Identities
Each transaction is between parties identified to each other by provably untampered copies of their identity, encrypted by each party specifically for that counterparty.
The identity credential lifecycle:
- Issuance: A trusted issuer (the Alberta government, ATB Financial, etc.)
verifies Alice's identity through a KYC ceremony and produces a
Pointcheval-Sanders signature on her identity scalar
m = H(identity_data). Alice receives(m, sigma)and stores it in her Holochain wallet. (See The Identity Fountain for the full PS construction.) - Derivation: For each Ethereum account, Alice's wallet rerandomizes the PS signature, generates a fresh identity key pair, encrypts her identity under the new key using ElGamal, and produces a NIZK proof linking the rerandomized signature to the ciphertext. This runs entirely offline.
- Registration: Alice registers the derived credential
(pk, E_alice, sigma', pi)in the on-chain IdentityRegistry. The contract verifies the PS signature and NIZK proof via theecPairingprecompile (235,000 gas, one-time). After registration, ~isVerified(alice) == true. - Re-encryption: When Alice must identify herself to counterparty Bob
(e.g., during an
approvecall on the BUCK contract), she decrypts her credential locally (she knowssk_alice) and re-encrypts the identity under Bob's public key with fresh randomness:E_bob = (r' * G, r' * pk_bob + M)whereM = m * Gis the identity message point. She produces a Chaum-Pedersen proof3pithatE_bobencrypts the same pointMas her registeredE_alice– without revealingm. -
Verification: The BUCK smart contract verifies:
E_aliceis read from the IdentityRegistry (not from Alice's calldata)piprovesE_bobencrypts the same plaintext asE_alice
Verification requires only 3-4 elliptic curve scalar multiplications (~29,000 gas via the alt_bn128 precompiles). No pairing operations at transaction time. The PS signature was verified once, at registration, and is never consulted again.
- Decryption: Only Bob can decrypt
E_bob(he hassk_bob). Only Alice can decryptE_alice(she hassk_alice). The issuer cannot decrypt either – they signed Alice's identity scalar, they never encrypted under any key. No third party can decrypt any re-encrypted copy.
This is a two-channel design. The on-chain ElGamal ciphertexts and
Chaum-Pedersen proofs form the proof chain: they bind Alice's registered
identity to the re-encrypted ciphertext Bob receives, without revealing
content. The actual identity_data (name, jurisdiction, ID number)
travels via the data channel: Alice's Holochain hApp sends it to Bob's
hApp, encrypted end-to-end. Bob verifies the binding:
M = C_b - sk_bob * R_b // decrypt ElGamal ciphertext assert H(identity_data) * G == M // bind off-chain data to proof chain
EC-ElGamal decryption yields a curve point M, not the scalar m.
Recovering m from M = m * G is the discrete logarithm problem. The
proof chain never carries plaintext – it proves which identity was sent.
The data channel delivers what that identity contains. The hash
commitment H(identity_data) * G == M binds them cryptographically: Bob
can verify the identity_data he received via Holochain is exactly the
identity the issuer certified and Alice registered on-chain.
There is no need for Proxy Re-Encryption (PRE), because Alice is online when
she calls approve and can perform the re-encryption directly. The
Chaum-Pedersen proof is the trust anchor at transaction time: it is a
mathematical guarantee – unforgeable under the discrete logarithm
assumption – that Alice re-encrypted her genuine, registered identity and
not a substitute. The PS signature is the trust anchor at registration
time: it guarantees the credential was issued by an authorized issuer.
ElGamal and Pointcheval-Sanders Over a Mandated Curve Group
Alberta Buck mandates that all identity credentials, all participant key pairs, all re-encryption operations, and all issuer signatures use the alt_bn128 elliptic curve (BN254)1 – the curve supported by Ethereum's precompiled contracts:
ecAdd(address0x06): point addition, 150 gasecMul(address0x07): scalar multiplication, 6,000 gasecPairing(address0x08): bilinear pairing check, 34,000 gas per pair + 45,000 base
This mandate is a design strength, not a limitation:
- Uniform proof verification: every Chaum-Pedersen proof and every Pointcheval-Sanders signature verification uses the same curve group, so a single on-chain verifier handles all identity operations.
- Precompile efficiency: per-transaction Chaum-Pedersen verification
uses
ecMul/ecAdd(29,000 gas). One-time credential registration uses ~ecPairingfor PS signature verification (~235,000 gas). - No cross-group compatibility issues: since all participants, issuers, and credentials use the same curve, re-encryption between any two participants is always algebraically compatible.
Participant key pairs for identity purposes are distinct from their Ethereum signing keys (which use secp256k1). The identity key pair is generated during credential derivation (not during the KYC ceremony – the KYC ceremony produces only the PS signature). The public key is registered in the IdentityRegistry alongside the participant's Ethereum address.
When Alice re-encrypts for N different counterparties, each re-encryption uses independent randomness. The resulting ciphertexts are IND-CPA secure: computationally indistinguishable from random curve points. An observer who collects all N ciphertexts cannot determine that they encrypt the same plaintext (without access to a counterparty's private key).
Chaum-Pedersen Proof of Re-Encryption Correctness
The Chaum-Pedersen protocol3 is a sigma protocol (Schnorr family) that proves two ElGamal ciphertexts encrypt the same message point, without revealing the message. Made non-interactive via the Fiat-Shamir heuristic, the proof is compact (~128 bytes: two scalars and two curve points) and verification requires only 3-4 multi-scalar multiplications.
Setup
Registered credential (verified at registration via PS signature + NIZK): E_alice = (R_a, C_a) = (r_a * G, r_a * pk_alice + M) where M = m * G (identity encoded as a curve point, m = H(identity_data)) Rerandomized PS signature sigma' verified at registration (not consulted again) Alice's re-encryption for Bob: E_bob = (R_b, C_b) = (r_b * G, r_b * pk_bob + M) using the SAME message point M
What Alice Proves (Non-Interactively)
"I know (sk_alice, r_b) such that: 1. pk_alice = sk_alice * G -- I own this public key 2. R_b = r_b * G -- I know E_bob's randomness 3. C_a - sk_alice * R_a = C_b - r_b * pk_bob -- same message point M"
Statement 3 is the core. The left side decrypts E_alice (only Alice can
compute this, since she knows sk_alice), yielding the message point M.
The right side extracts M from E_bob (only Bob could alternatively
compute this with sk_bob). If Alice encrypted different data I_fake,
then I * G != I_fake * G and no valid proof exists – it is not merely hard
to compute, it is mathematically impossible under the discrete logarithm
assumption.
Verification (What the Contract Computes)
Given public inputs:
E_alice = (R_a, C_a) -- from IdentityRegistry (PS-verified at
registration, read from storage -- NOT
supplied by Alice)
E_bob = (R_b, C_b) -- from Alice's approve() calldata
pk_alice -- from IdentityRegistry
pk_bob -- from IdentityRegistry
proof = (e, s1, s2) -- Fiat-Shamir challenge and responses
Verify:
Recompute challenge e from commitments
Check consistency of s1, s2 against e, the public keys, and ciphertexts
3-4 ecMul + 3-4 ecAdd operations
Critical implementation requirement: E_alice is read from on-chain
storage (the IdentityRegistry), not supplied by Alice as calldata. This
anchors the proof to the registered credential. If Alice could supply
her own E_alice, she could substitute a fake credential and produce a
valid proof against it.
The Fiat-Shamir challenge must bind all public inputs and context to prevent replay and malleability:
e = H(G, pk_alice, pk_bob, R_a, C_a, R_b, C_b, T1, T2,
msg.sender, spender, block.chainid)
Including msg.sender and spender (Ethereum addresses) binds the
proof to the specific transaction context. Including block.chainid
prevents cross-chain replay. On-chain, msg.sender is authenticated
by ECDSA and spender is a calldata argument to approve(), but
including them in the hash explicitly prevents a proof generated for
one (sender, spender) pair from being replayed in another context.
This is standard Fiat-Shamir domain separation, not an additional
cryptographic assumption.
Gas Cost
Per-Transaction (Chaum-Pedersen Verification at approve)
| Operation | Count | Gas each | Total |
|---|---|---|---|
ecMul (precompile) |
4 | 6,000 | 24,000 |
ecAdd (precompile) |
4 | 150 | 600 |
keccak256 (Fiat-Shamir) |
1 | 36 | 36 |
| Calldata (128 bytes) | 2,048 | ||
Storage read (E_alice) |
1 | 2,100 | 2,100 |
| Total | ~29,000 gas |
The approve call costs ~29,000 gas for the identity proof plus the
standard ERC-20 approve cost (46,000 gas), totaling ~75,000 gas. This
is paid once per counterparty pair. Subsequent ~transfer and
transferFrom calls emit only minimal receipt events (addresses + opaque
hashes, ~2,000 gas) with no additional proof work.
One-Time (PS Signature + NIZK Verification at Registration)
| Operation | Count | Gas each | Total |
|---|---|---|---|
ecPairing (precompile) |
3-4 | 34,000 | 147,000 |
ecPairing base cost |
1 | 45,000 | 45,000 |
ecMul (NIZK verification) |
3-4 | 6,000 | 24,000 |
ecAdd (NIZK verification) |
3-4 | 150 | 600 |
| Calldata + SSTORE overhead | ~10,000 | ||
| Total | ~235,000 gas |
The NIZK proof linking the PS signature to the ElGamal ciphertext is
a standard Schnorr-family sigma protocol – not a Groth-Sahai proof.
The PS verification relation e(sigma'_1, X + m * Y) = e(sigma'_2, g_2)
is linear in m: the public inputs sigma'_1, sigma'_2, X, Y, g_2
are fixed curve points, and the secret m enters linearly via m * Y.
A single challenge-response pair binds m to both the pairing equation
and the ElGamal ciphertext. The pairing is computed by the verifier
on public inputs; the prover demonstrates knowledge of m via scalar
responses. No bilinear-map proof system is needed.
The concrete verification protocol:
Public inputs:
sigma' = (sigma'_1, sigma'_2) -- rerandomized PS signature (G_1)
E_new = (R, C) -- ElGamal ciphertext (G_1)
pk_new -- identity public key (G_1)
(X, Y) -- issuer public key (G_2)
g_2 -- generator (G_2)
Proof: pi = (e, s_m, s_r)
Verifier computes:
// (a) PS signature check via ecPairing precompile:
// Reconstruct the commitment A = s_m * sigma'_1 - e * sigma'_2
// in G_1, then verify the pairing product equation:
A_ps = ecMul(sigma'_1, s_m) + ecMul(sigma'_2, -e) // 2 ecMul + 1 ecAdd
ecPairing([A_ps, Y], [ecMul(sigma'_1, e), X],
[ecMul(sigma'_2, -e), g_2]) == 1 // 3 pairings
// (b) ElGamal consistency check (pure G_1 arithmetic):
// s_m * G + s_r * pk_new == e * C + T_b
// s_r * G == e * R + T_r
// where T_b, T_r are the prover's commitments (included in proof)
// (c) Fiat-Shamir challenge reconstruction:
e' = H(sigma', E_new, pk_new, A_ps, T_b, T_r, registrant_address)
require(e' == e)
Part (a) uses the ecPairing precompile (3 pairs: 147K gas).
Parts (b) and (c) use ~ecMul / ecAdd (~30K gas). Total: ~235K gas.
This is a standard Schnorr-family sigma protocol applied to a linear
pairing relation – the same class of proof used in BLS signature
verification and PS credential presentation protocols.
This one-time registration cost is comparable to deploying a small contract. For an account that will hold meaningful value and transact many times, it is negligible. Compare: Groth16 SNARK verification requires similar pairing operations (~200,000-300,000 gas) but must be performed per transaction if used for re-encryption proofs.
Attacks and Defenses
Nine adversarial scenarios follow – from a sanctioned individual substituting a false identity, through issuer credential forgery, to systematic attacks on the trust chain – each defeated by a specific mathematical checkpoint. The Chaum-Pedersen proof catches identity substitution; the PS pairing equation catches credential forgery; the Fiat-Shamir binding prevents replay; and the on-chain proof chain provides non-repudiation. A summary table maps each attack to its failure point and the hardness assumption that protects it.
The trust chain in every scenario is:
Issuer PS-signs identity m --> identity is genuine Alice derives (E_alice, sigma', pi) --> credential is unlinkable PS + NIZK verified at registration --> credential is issuer-authorized E_alice stored in registry --> contract reads the genuine credential Chaum-Pedersen proof verified --> E_bob encrypts same identity as E_alice Only Bob can decrypt E_bob --> identity revealed only to counterparty
Breaking any link requires breaking either the q-SDH assumption (PS signature unforgeability), the discrete logarithm assumption on alt_bn128 (Chaum-Pedersen soundness, ElGamal security), or ECDSA (Ethereum transaction authenticity) – all standard hardness assumptions underpinning Ethereum's own security.
Attack 1: Alice Substitutes a False Identity for Bob
Scenario
Alice is a sanctioned individual. She completed KYC under her real identity
and received a legitimate PS-verified credential E_alice containing her
true identity I. She now wants to transact with Bob but wants Bob (and
any future court) to believe she is someone else – say, her clean associate
Carol.
Alice constructs a fake re-encryption using Carol's identity I_fake:
E_bob_fake = (r' * G, r' * pk_bob + I_fake * G)
She submits E_bob_fake to approve() and attempts to produce a
Chaum-Pedersen proof tying it to her registry credential.
Why It Fails
The Chaum-Pedersen verification checks:
C_a - sk_alice * R_a == C_b - r' * pk_bob
Expanding the left side (from the registered E_alice in the registry):
(r_a * pk_alice + I * G) - sk_alice * (r_a * G) = r_a * sk_alice * G + I * G - sk_alice * r_a * G = I * G
Expanding the right side (from Alice's fake E_bob):
(r' * pk_bob + I_fake * G) - r' * pk_bob = I_fake * G
The proof requires I * G == I_fake * G, which requires I == I_fake.
Since I != I_fake (Alice is not Carol), these are distinct curve points.
Under the discrete logarithm assumption, Alice cannot produce valid proof
scalars (s1, s2) that satisfy the verification equations. The proof does
not exist – not "hard to find," but mathematically non-existent.
What the Contract Sees
approve() reverts: "Re-encryption proof invalid." The transaction fails
on-chain. Alice cannot complete the identity handshake with false data.
The revert is indistinguishable from a malformed transaction – no
information about Alice's intent leaks.
Cost to Alice
She wasted gas on a failed transaction. Her address is still associated with her real registered credential in the registry. Nothing has changed.
Attack 2: Alice Forges an Issuer Credential
Scenario
Alice never completed KYC, or completed KYC but wants a credential with
different identity data. She picks a fabricated identity scalar
m_fake = H(fake_data), generates a random PS-like signature, creates an
ElGamal ciphertext, and fabricates a NIZK proof:
m_fake = H("Carol Smith, Alberta, ...")
sigma_fake = (random_h, random_s) -- not a valid PS signature
E_alice_fake = (r * G, m_fake * G + r * pk_alice)
pi_fake = ... -- fabricated NIZK
She attempts to register this credential in the IdentityRegistry.
Why It Fails
The IdentityRegistry verifies the Pointcheval-Sanders signature against trusted issuer public keys registered in the TrustedIssuersRegistry (part of the ERC-3643 framework6). Registration checks the pairing equation:
e(sigma'_1, X + m * Y) == e(sigma'_2, g_2)
where (X, Y) is the trusted issuer's public key in G_2. Alice does
not know the issuer's secret key (x, y), so she cannot produce a
sigma' that satisfies this equation for any m – let alone for
m_fake. The PS signature is unforgeable under the q-SDH assumption.
Even if Alice could somehow produce a valid-looking PS signature (she
cannot), the NIZK proof pi must prove that the ElGamal ciphertext
E_alice encrypts the same m that the PS signature covers. Forging
the proof requires breaking the discrete logarithm assumption.
Two independent barriers must both be broken. Neither has been broken in the history of elliptic curve cryptography.
What the Contract Sees
registerCredential() reverts: "Invalid issuer signature." Alice is not
registered; isVerified(alice) == false. She cannot participate in any
BUCK operation requiring identity.
Attack 3: Alice and Complicit Bob Launder With False Identities
Scenario
Alice and Bob are both criminals. Both have legitimate PS-verified credentials (they passed KYC under their real identities). They want to transact with each other, but want the encrypted identity records to show different people – so that if a court later compels Bob to decrypt Alice's identity blob, it points to an innocent third party.
They agree: Alice will encrypt a false identity I_fake for Bob and submit
it. Bob will claim (if asked) that the decrypted identity is genuine.
Why It Fails
Alice's approve() call must pass Chaum-Pedersen verification. The
contract reads E_alice from the IdentityRegistry – not from Alice's
calldata.
// Inside approve(): E_alice = identityRegistry.getCredential(msg.sender); require(chaumPedersenVerify(E_alice, E_bob_submitted, proof));
Alice cannot substitute a different E_alice because the contract reads it
from storage. She cannot produce a valid Chaum-Pedersen proof linking her
fake E_bob to the real E_alice because the message points differ (same
math as Attack 1).
Bob's willingness to accept false data is irrelevant. The proof was
verified against the registered credential before E_bob was stored.
If approve() succeeded, E_bob necessarily contains Alice's real identity.
When a court later compels Bob to decrypt, he produces Alice's true identity
– regardless of any prior agreement between them.
Bob cannot produce a different plaintext from the same E_bob (ElGamal
decryption is deterministic given the private key). Bob cannot claim the
E_bob is unrelated to Alice (the on-chain IdentityExchange event records
that Alice submitted it during approve, and the proof verification
succeeded).
What the Contract Sees
If Alice submits false data: approve() reverts ("Re-encryption proof
invalid") – same as Attack 1.
If Alice submits real data (because she has no choice): approve() succeeds,
and E_bob provably contains her real identity. The laundering scheme
fails silently – Alice and Bob transacted, but the identity trail is
genuine and court-recoverable.
Attack 4: Alice Repudiates a Transaction She Made
Scenario
Alice transacted legitimately with Bob (a law-abiding merchant). Later, Alice is investigated. She claims she never transacted with Bob, or that the identity Bob received was fabricated by Bob. Alice hopes that because the re-encrypted blob is opaque to everyone except Bob, a court cannot verify its authenticity without trusting Bob's word.
Why It Fails
The on-chain record contains everything needed to verify, without trusting Bob:
- The
IdentityExchange(alice, bob, E_bob)event is on-chain, emitted during Alice'sapprove()call. It was sent from Alice's address (verified bymsg.sender). - The
approve()transaction succeeded on-chain, which means the Chaum-Pedersen proof verified against Alice's registeredE_alicefrom the registry. This is an immutable execution fact. - Therefore
E_bobprovably encrypts the same identity asE_alice. This follows from the soundness of the Chaum-Pedersen protocol – it is a mathematical fact, not testimony. - When the court compels Bob to decrypt
E_bob, the resulting plaintextIis provably Alice's issuer-certified identity. The chain of trust:
Issuer PS-signed Alice's identity m (verified at registration) E_alice stored in IdentityRegistry (on-chain, immutable) Alice called approve() with E_bob + proof (on-chain tx, msg.sender = alice) Chaum-Pedersen proof verified on-chain (execution succeeded) ==> E_bob encrypts Alice's real identity (mathematical fact) Bob decrypts E_bob --> I (compelled, deterministic) I is Alice's issuer-certified identity (proven)
What the Court Sees
An unbroken, cryptographically verified chain from issuer to decrypted identity. Alice's repudiation is contradicted by on-chain proof verification records that she cannot alter or dispute.
Attack 5: Criminal Bob Denies Receiving Alice's Identity
Scenario
Bob is a criminal merchant. Alice (law-abiding) transacted with Bob. Authorities investigate Bob. Bob claims he never received Alice's identity and cannot produce it – hoping to deny knowledge of his counterparties, or to shield Alice from being identified as his customer.
Why It Fails
The IdentityExchange(alice, bob, E_bob) event is on-chain and immutable.
The court retrieves E_bob directly from the blockchain – Bob's cooperation
is not needed to find the ciphertext.
Bob is compelled to decrypt:
M = C_b - sk_bob * R_b
If Bob claims he "lost" his identity private key (the alt_bn128 key, which is distinct from his Ethereum signing key):
- The court holds Bob in contempt, as it would for any refusal to produce subpoenaed records. "I lost the key" is no more credible for a cryptographic key than for a filing cabinet – particularly when the key was generated during a KYC ceremony and Bob accepted transactions requiring its use.
- Even without Bob's cooperation, the court can establish from the on-chain
proof verification that
E_bobdoes contain a genuine identity. Bob's refusal to decrypt is itself evidence of obstruction.
Bob cannot claim E_bob is meaningless or fabricated: the successful
Chaum-Pedersen proof verification is an on-chain fact.
What the Court Sees
E_bob is on-chain. The proof that it contains Alice's real identity is
on-chain. Bob decrypts or faces contempt. The cryptographic record is
self-authenticating.
Attack 6: Eve Links Alice's Identities Across Counterparties
Scenario
Eve is a surveillance actor (competitor, stalker, rogue state). She observes
that Alice's address called approve for multiple counterparties: Bob,
Carol, and Dave. Eve collects the IdentityExchange events:
IdentityExchange(alice_addr, bob_addr, E_bob) IdentityExchange(alice_addr, carol_addr, E_carol) IdentityExchange(alice_addr, dave_addr, E_dave)
Eve wants to learn Alice's real identity, or to determine whether these transactions reveal a pattern (e.g., Alice's spending habits).
Why It Fails (Content Privacy Holds)
Each re-encryption uses independent randomness:
E_bob = (r_1 * G, r_1 * pk_bob + I * G) E_carol = (r_2 * G, r_2 * pk_carol + I * G) E_dave = (r_3 * G, r_3 * pk_dave + I * G)
The ciphertexts are IND-CPA secure (semantic security of ElGamal): each is computationally indistinguishable from a random pair of curve points. Eve cannot decrypt any of them without the counterparty's private key. She cannot determine from the ciphertexts alone what identity they encode, nor can she compare them to determine if they encode the same identity.
What Eve does know: all three events originate from alice_addr. But
this is exactly the information already visible in standard ERC-20 Approval
events. The encrypted identity blobs add zero additional linkability
beyond Ethereum's inherent pseudonymous address model.
What Eve does not know: Alice's name, jurisdiction, ID number, or any attribute of her identity. She sees an address; she does not see a person.
What Eve Sees
Pseudonymous Ethereum addresses and opaque ciphertexts that are computationally indistinguishable from random. The same view she has of any ERC-20 token, plus meaningless (to her) encrypted blobs.
Cross-Account Unlinkability
A stronger version of this attack: Eve suspects that addresses addr_1,
addr_2, and addr_3 all belong to Alice. She examines each address's
registered credential in the IdentityRegistry.
Each credential was derived independently through the Identity Fountain: different rerandomized PS signatures, different identity key pairs, different ElGamal ciphertexts with independent randomness. PS rerandomization is statistically unlinkable – not merely computationally hard to correlate, but information-theoretically impossible. The credentials contain zero bits of mutual information.
Eve's only path to linking accounts is off-chain analysis: timing, amounts, behavioral patterns. The cryptographic identity layer gives her nothing.
Scope of Unlinkability
Alberta Buck provides identity privacy (no observer can determine who owns an address from the credential) and credential unlinkability (no observer can cryptographically link two credentials to the same person). It does not provide transaction graph privacy: Ethereum balances and transfer events are public, and standard chain-analysis techniques – timing correlation, amount matching, funding-source tracing – apply to BUCK as they do to any ERC-20 token.
Transaction graph privacy is a distinct problem solved by different primitives (confidential transactions, mixing protocols, or fully shielded transfers as in Zcash). These are orthogonal to the identity layer and could complement it in the future. The identity system's guarantee is narrower but sufficient: even if Eve links Alice's addresses through behavioral analysis, she cannot learn Alice's name or identity data from any on-chain artifact. The cryptographic identity layer ensures that linking addresses reveals spending patterns, not people.
Why \( M \) Is the Same Across All Accounts
A natural concern: if Alice derives ten accounts from the Identity Fountain, and each counterparty who decrypts their re-encrypted ciphertext recovers the same \( M = m \cdot G \), doesn't that break unlinkability?
No. The identity scalar \( m = H(\text{identity\_data}) \) is
intentionally invariant because it is Alice's identity. If each
account used a different \( m \), the two-channel verification
would break: Bob couldn't verify that the identity_data he
received matches what the issuer certified. The Identity Fountain
protects the credential wrapping (\( \sigma' \), \( pk \),
\( E \)), not the identity scalar itself.
The privacy boundary is:
| Observer | Can link accounts? | Why? |
|---|---|---|
| Eve (passive, on-chain) | NO | All public artifacts are independent random |
| values (statistical unlinkability) | ||
| Bob (authorized) | Learns one account | By design – the purpose of approve |
| Bob + Carol (colluding) | Yes, via \( M \) | But both already know Alice's name from |
identity_data exchange |
||
| Issuer (on-chain only) | NO | Cannot extract \( M \) without a secret key |
| Issuer (given \( M \)) | YES | By design – regulatory compliance path |
Before approve, Alice's accounts are unlinkable to everyone.
After approve, only that specific counterparty learns Alice's
identity for that account. Counterparties who already know Alice's
name gain nothing new from comparing \( M \) values.
See the worked example for the full argument and the AMM pool subpoena scenario.
Attack 7: Alice Uses a Revoked or Expired Credential
Scenario
Alice's identity credential was revoked by the issuer (e.g., her Alberta
residency expired, fraud was detected in her original KYC documents, or she
is subject to new sanctions). Alice still holds her old E_alice and
sigma and attempts to continue transacting.
Why It Fails
The IdentityRegistry tracks credential validity. When the issuer revokes Alice's credential:
identityRegistry.revokeIdentity(alice_address)
Subsequent calls to isVerified(alice) return false. Alice's approve
call – and any transfer or transferFrom – reverts at the identity
check, before the Chaum-Pedersen proof is even evaluated.
Alice's old credential and proofs remain mathematically valid (the cryptography is eternal), but the contract refuses to accept them because her registration is no longer active. The revocation is a separate on-chain state, controlled by the trusted issuer.
What the Contract Sees
isVerified(alice) == false. Transaction reverts immediately. The
still-valid-but-revoked credential is never consulted.
Attack 8: Unwitting Bob Receives a Transaction From Criminal Alice
Scenario
Bob is a law-abiding merchant running a BUCK-accepting storefront. Alice is a criminal who passed KYC (perhaps before she was sanctioned, or under a jurisdiction that has not yet flagged her). Alice sends BUCK to Bob through a normal transaction. Bob has no way to know Alice is a criminal at the time of the transaction.
Later, authorities investigate Alice. Bob is concerned: did he unknowingly participate in money laundering? Can Alice's identity in the receipt exonerate him?
Why the Scheme Protects Bob
Bob received Alice's re-encrypted identity E_bob during the approve
handshake (or Bob pre-approved Alice via approve(alice, 0, ...) to
receive from her). The Chaum-Pedersen proof verified on-chain, so E_bob
provably contains Alice's real, issuer-certified identity.
When authorities investigate:
- Bob decrypts
E_boband produces Alice's identityI. - The on-chain proof record establishes that
Iis genuine (not something Bob fabricated to frame Alice, and not something Alice fabricated to deceive Bob). - Bob can demonstrate he had no way to know Alice was a criminal: the identity he received was a valid, PS-verified credential at the time of the transaction. The revocation (if any) came later.
- Bob's good faith is supported by the cryptographic record: he accepted a transaction from a verified participant and holds a court-presentable receipt.
The system protects honest participants by creating a tamper-proof record of who they transacted with. Bob is not liable for Alice's criminality; he is protected by the same cryptographic chain that convicts Alice.
What the Court Sees
Bob holds a provably genuine receipt. Alice's identity was valid at transaction time. Bob acted in good faith. The receipt is evidence of Bob's compliance, not his complicity.
Attack 9: Systematic Forgery – Alice Attacks the Trust Chain
The previous attacks target individual operations. This attack assumes Alice is willing to lie about every artifact she produces – hashes, proofs, signatures, ciphertexts – and asks whether she can deceive anyone about the validity or content of her identity.
The trust chain has three links. We attack each one.
Link 1: PS Signature (Issuer Authority)
Alice has (m, sigma_1, sigma_2) from the issuer. She produces
sigma' = (t * sigma_1, t * sigma_2).
Can she produce a sigma' that signs a different m_fake?
PS verification checks:
e(sigma'_1, X + m * Y) = e(sigma'_2, g_2)
Rearranging:
e(sigma'_1, Y)^m = e(sigma'_2, g_2) * e(sigma'_1, X)^(-1)
The right side is fixed by sigma' (which Alice chose). The left side is
determined by m. For sigma' derived from the issuer's signature on
m, this equation holds only for the real m. Alice cannot produce a
valid PS signature on any m_fake without the issuer's secret key
(x, y). Blocked by q-SDH unforgeability.
Link 2: NIZK Proof (Binding PS Signature to ElGamal Ciphertext)
Alice provides (sigma', E_new, pk_new, pi). The NIZK proof proves
knowledge of (m, r) satisfying:
a) e(sigma'_1, X + m * Y) = e(sigma'_2, g_2) -- sigma' signs m b) C = m * G + r * pk_new -- E_new encrypts m c) R = r * G -- consistent randomness
Can she use a valid sigma' (signing m) but create E_new encrypting
m_fake?
The sigma protocol uses a single response scalar s_m that must
simultaneously satisfy conditions (a) and (b):
- For condition (a):
s_mencodes the realm(the valuesigma'signs) - For condition (b):
s_mencodes whatever is inE_new
If E_new encrypts m_fake != m, no single s_m satisfies both checks.
Blocked by sigma protocol soundness.
Can she forge the Fiat-Shamir challenge? The challenge
e = H(sigma', E_new, pk_new, commitments) depends on all public inputs.
Finding inputs that yield a favorable challenge requires a keccak256
preimage attack. Blocked by random oracle assumption.
Link 3: Chaum-Pedersen Proof (Binding Re-encryption to Registered Credential)
At approve() time, Alice provides E_bob and a Chaum-Pedersen proof.
The contract reads E_alice from storage.
Can she re-encrypt a different identity? The proof requires:
C_a - sk_alice * R_a = C_b - r_b * pk_bob
Both sides must equal the same message point M = m * G. If Alice
encrypts M_fake != M, the equation is unsatisfiable. Blocked by DLog
hardness. (Same mathematics as Attack 1.)
Can she supply a different E_alice? No – read from storage, not from
calldata.
Critical Edge Case: The Trivial Signature
If Alice sets sigma' = (O, O) where O is the point at infinity:
e(O, X + m * Y) = 1 (pairing with identity is trivial) e(O, g_2) = 1 (same)
The pairing equation 1 = 1 holds for any m. Alice could register a
credential encrypting any m_fake she wants, produce a valid-looking NIZK
proof (because condition (a) is trivially satisfied), and the verification
would pass.
She achieves this by picking t = 0 in the rerandomization:
sigma' = (0 * sigma_1, 0 * sigma_2) = (O, O).
The fix is standard: the PS signature specification requires
sigma'_1 != O. The registration contract must check this before
evaluating the pairing:
require(sigma_prime[0] != 0 || sigma_prime[1] != 0, "Degenerate signature");
On BN254, G_1 has prime order (cofactor 1), so there are no small-order
points. The identity check sigma'_1 != O is the only degenerate case.
Without this check, the entire fountain is broken. With it, the system is sound.
Additional Attack Surfaces
Off-curve points: post-Istanbul, the ecPairing precompile validates
that inputs lie on alt_bn128 and reverts otherwise. Alice cannot use
off-curve points to confuse the pairing computation.
Subgroup attacks on G_2: the ecPairing precompile validates G_2
subgroup membership (EIP-197). Alice cannot exploit small subgroups in
the twist curve.
Eve copies Alice's registered credential: Eve can read
(pk, E, sigma', pi) from the chain and re-register it for her own
address. But Eve cannot use it – the Chaum-Pedersen proof requires
knowledge of sk_alice (condition 1: pk_alice = sk_alice * G). A
stolen credential is useless without the corresponding secret key.
Alice shares raw credential material: Alice can give (m, sigma) to
an accomplice, who can then derive valid credentials containing Alice's
identity. But the decrypted identity is always Alice's – the
consequences fall on her. This is inherent in any bearer credential
system; it is no different from handing someone your driver's license.
Verdict
The system is sound against an untrustworthy Alice who is willing to lie about every artifact she produces. She cannot forge any artifact that would cause a verifier to accept a false identity. The three layers – PS unforgeability, NIZK soundness, Chaum-Pedersen soundness – chain together so that breaking any link requires breaking a standard hardness assumption.
One critical implementation requirement: sigma'_1 != O must be checked
at credential registration. This is a standard requirement of the
Pointcheval-Sanders scheme and costs negligible gas.
Summary: Why the Scheme Defeats All Attacks
Every attack that involves substituting false identity data fails for the same fundamental reason: the Chaum-Pedersen proof is sound. A valid proof for a false statement does not exist.
The proof asserts: E_bob encrypts the same M as E_alice The contract reads: E_alice from the registry (PS-verified, immutable) Therefore: E_bob must encrypt Alice's real identity Alice cannot: supply a different E_alice (contract reads from storage) Alice cannot: produce a valid proof for different M (soundness) Alice cannot: forge the issuer's PS signature (q-SDH unforgeability) Alice cannot: link her accounts to each other (PS rerandomization) Bob cannot: produce a different plaintext (ElGamal decryption is deterministic) Eve cannot: decrypt E_bob (she lacks sk_bob) Eve cannot: link Alice's accounts (statistical unlinkability)
Three independent hardness assumptions protect the system:
- PS signature unforgeability (q-SDH assumption): prevents forged credentials
- Discrete logarithm hardness (alt_bn128): prevents false Chaum-Pedersen proofs and unauthorized ElGamal decryption
- ECDSA unforgeability (secp256k1): authenticates Ethereum transactions
All three assumptions also underpin Ethereum itself. If any breaks, Ethereum's own security fails first – the Alberta Buck identity system does not introduce any novel cryptographic assumptions.
Identity Visibility Modes
BUCK accounts operate in one of three identity modes, which determine
the data flow at approve and transfer time. Private accounts
require bilateral approve calls (each party re-encrypts their
identity for the counterparty); public accounts (AMM pools,
exchanges) are exempt from approve because their identity_data
is already world-readable; contract accounts inherit their deployer's
identity. The four transfer combinations (Private-Private,
Private-Public, Public-Private, Public-Public) range from two
approve calls with full Holochain exchange down to a standard
ERC-20 transfer with no identity work at all.
| Mode | What on-chain reveals | What off-chain reveals |
|---|---|---|
| Anonymous-valid | Address is verified (bit) | Encrypted receipt: identities of both |
| (private) | isVerified(addr) == true | parties, decryptable only by participants |
| + optional regulatory escrow key. | ||
Requires bilateral approve for transfer. |
||
| Public | Address is verified + public | Full name, jurisdiction, credentials, |
| identity claim (plaintext) | track record – world-readable. | |
| isPublic(addr) == true | No approve needed – counterparties |
|
| already have this account's identity. | ||
| Contract | Contract address is verified; | Deployer's identity is the contract's |
| linked to deployer's identity | identity; receipts encrypted to deployer | |
| Permissionless | No identity check | N/A |
Operations Table
Every Alberta Buck operation has a defined identity requirement and receipt model. High-risk operations (BuckCredit creation, oracle claims, governance) require public identity; medium-risk operations (transfers, DeFi swaps) require anonymous-valid identity with encrypted 3-party ECDH receipts; low-risk operations (burns, credit activation) require only self-verification; and permissionless operations (price reads, balance queries) need no identity at all. The tables below specify the exact identity mode, counterparty requirements, and receipt format for each operation across the BUCK ERC-20, BuckCredit ERC-721, and governance contracts.
Core BUCK (ERC-20) Operations
| Operation | Caller identity | Counterparty identity | Receipt | Notes |
|---|---|---|---|---|
mint |
Anonymous-valid | N/A (self-mint) | Event log | Caller must hold BuckCredits; identity |
| KYC (topic 1) | verified but not disclosed on-chain | |||
burn |
Anonymous-valid | N/A (self-burn) | Event log | Reduces outstanding balance |
| KYC (topic 1) | ||||
transfer |
Anonymous-valid | Anonymous-valid | Encrypted | Both parties verified; receipt encrypted |
| KYC (topic 1) | KYC (topic 1) | 3-party | 3-party ECDH (no unilateral decryption) | |
transferFrom |
Anonymous-valid | Anonymous-valid | Encrypted | Spender verified; owner and recipient |
| KYC (topic 1) | KYC (topic 1) | 3-party | identities in encrypted receipt | |
approve |
Anonymous-valid | Anonymous-valid | Event log | Approving a spender for transferFrom |
| KYC (topic 1) | KYC (topic 1) |
BuckCredit (ERC-721) Operations
| Operation | Caller identity | Counterparty identity | Receipt | Notes |
|---|---|---|---|---|
createCredit |
Public | Anonymous-valid | Encrypted | Insurer MUST be publicly identified |
| KYC + insurer (42) | KYC (topic 1) | to parties | (their reputation backs the credit). | |
| Client may be anonymous-valid. | ||||
activate |
Anonymous-valid | N/A (self) | Event log | Credit owner activates portion of value |
| KYC (topic 1) | ||||
updateCredit |
Public | N/A | Event log | Insurer updates params; must be public |
| KYC + insurer (42) | (reappraisal is a public commitment) | |||
transfer (NFT) |
Anonymous-valid | Anonymous-valid | Encrypted | Transferring insurance NFT; new owner |
| KYC (topic 1) | KYC (topic 1) | 3-party | inherits the credit |
BuckKController (PID Stabilization)
| Operation | Caller identity | Receipt | Notes |
|---|---|---|---|
compute |
Permissionless | Event log | Anyone can trigger PID update; minter |
| pays gas. No identity needed. | |||
setGains |
Governance | Event log | Governance multisig or vote result. |
| Governance members publicly identified. | |||
addBasketComponent |
Governance | Event log | Adding a new commodity to the basket. |
setDT |
Governance | Event log | Changing the PID update interval. |
Oracle Operations
| Operation | Caller identity | Receipt | Notes |
|---|---|---|---|
| Submit claim | Public | Public log | "I, Perry Kundert, claim Gold was $2905 |
| KYC + reporter (43) | at block 19400000." Public identity is | ||
| the entire point: reputation accrues. | |||
| Commit value (L1) | Public | Event log | Authorized reporters sign the commitment. |
| KYC + reporter (43) | Signatures are publicly verifiable. | ||
| Challenge/dispute | Anonymous-valid | Evidence | Challenger need not be public; the |
| KYC (topic 1) | on-chain | evidence speaks for itself. | |
| Governance vote | Anonymous-valid | Vote record | Stake-weighted vote on oracle selection. |
| (oracle selection) | KYC (topic 1) | Vote weight from Buck holdings is public; | |
| voter identity may be private. |
DeFi Integration (Uniswap, Lending, etc.)
| Operation | Caller identity | Contract identity | Receipt | Notes |
|---|---|---|---|---|
| Create pool | Public | Contract registered | Event log | Pool deployer is publicly identified. |
| (BUCK/USDT) | KYC (topic 1) | to deployer's identity | Contract address linked to deployer's | |
| ElGamal credential in IdentityRegistry. | ||||
| Swap BUCK -> USDT | Anonymous-valid | Contract (deployer) | Encrypted | User sends BUCK to pool via transferFrom. |
| KYC (topic 1) | 3-party | Receipt: user + deployer + escrow. | ||
| Swap USDT -> BUCK | Anonymous-valid | Contract (deployer) | Encrypted | Pool sends BUCK to user. Receipt same. |
| KYC (topic 1) | 3-party | |||
| Add liquidity | Anonymous-valid | Contract (deployer) | Encrypted | User transfers BUCK to pool. |
| KYC (topic 1) | 3-party | |||
| Remove liquidity | Anonymous-valid | Contract (deployer) | Encrypted | Pool transfers BUCK to user. |
| KYC (topic 1) | 3-party |
Identity Management
| Operation | Caller identity | Issuer identity | Receipt | Notes |
|---|---|---|---|---|
| KYC ceremony | Self | Trusted issuer | Off-chain | Participant submits docs to issuer; |
| (no claims yet) | (publicly identified) | PS sig | issuer PS-signs identity scalar. | |
| Register in registry | Self | N/A | Event log | Derives credential offline; registers |
| with PS signature + NIZK proof. | ||||
| Add public identity | Self | Trusted issuer | On-chain | Opts in to public identification. |
| claim | KYC (topic 1) | (publicly identified) | claim | Exempts counterparties from approve. |
| Revoke claim | Issuer or self | N/A | Event log | Removes a claim (e.g., expired license). |
| N/M recovery | N-of-M parties | N/A | On-chain | Transfers identity to new address after |
| (all identified) | + off-chain | N of M designated parties agree. |
Contract Identity: How DeFi Pools Become BUCK Counterparties
Smart contracts can't do KYC, yet every BUCK transfer requires both
parties to have verified identity. The solution: the pool deployer
derives a separate credential from their own PS-signed identity (via
the Identity Fountain) and registers it for the contract address.
The deployer – a real person with a verified identity – becomes the
contract's legal counterparty for all BUCK transfers. Public pools
(isPublic = true) exempt their counterparties from needing the pool
to call approve, enabling the standard AMM flow where millions of
private accounts swap against a single public pool.
A Uniswap pool contract is just an address. For BUCK transfers to/from that
address to pass isVerified, the contract must have an identity in the
IdentityRegistry. But a contract can't do KYC. The solution:
The pool deployer's identity becomes the contract's identity.
When someone creates a BUCK/USDT Uniswap pool:
- Deployer (a verified BUCK participant) calls the Uniswap factory to create the pool. The factory deploys a new contract at a deterministic address.
- Deployer derives a separate credential for the pool contract (from the
same PS-signed identity, via the Identity Fountain) and registers it:
identityRegistry.registerCredential(poolAddress, pk_deployer, E_deployer, sigma', pi)This links the pool contract's address to the deployer's credential. The pool inherits the deployer's verified identity. - Now
isVerified(poolAddress)returns true. BUCK transfers to/from the pool pass the identity check. - When a user calls
approvefor the pool, the Chaum-Pedersen proof is verified against the pool's credential (which is the deployer's credential). The deployer's identity becomes the counterparty identity in all encrypted receipts.
This means: if you deploy a BUCK DeFi pool, you are the identified legal operator. Your identity is on the line for every transaction through that pool. If a court subpoenas you, you can be compelled to decrypt the ElGamal ciphertexts (because your identity private key was used for the pool's identity exchange handshakes).
On-Chain Integration: Receipts and Transfer Flow
The BUCK ERC-20 contract stores and emits the bilateral approve /
transfer protocol, the BuckTransferReceipt event format, and the
_receiptFragments storage layout. The central tension is that the
EVM hides nothing – every storage slot and event is publicly
reconstructible – so the contract carries only opaque ciphertexts
and verification flags, never plaintext identity. All proof
verification happens during approve (~29K gas); the transfer
itself performs only boolean checks on pre-computed flags, yielding a
standard ERC-20 transfer flow with identity guarantees where no
on-chain artifact reveals who is transacting with whom.
The Receipt Constraint
Events are public. Every emit on Ethereum is readable by every node.
A naive design that emits identity addresses or public keys in receipt
events creates a permanent, public, linkable identity graph of every BUCK
transfer – defeating the entire privacy model.
The constraints that drive the on-chain design:
- The EVM is transparent: every contract execution, every storage slot, every emitted event is publicly reconstructible. The BUCK contract cannot hold decrypted identity data, even transiently.
- The contract must verify, not learn: the BUCK contract enforces
isVerifiedand verifies Chaum-Pedersen proofs. It confirms that a re-encrypted identity ciphertext is genuine. It never learns the identity itself. - DeFi timing: in a
transferFromcall, the Uniswap router cannot pass receipt data. Identity exchange must happen earlier, atapprovetime.
The ElGamal Chaum-Pedersen approach resolves all three. The contract reads
E_alice from the IdentityRegistry (not from calldata), verifies a compact
Chaum-Pedersen proof (~29,000 gas), stores a hash of the re-encrypted
ciphertext, and emits only opaque curve point coordinates. No identity
content touches the EVM in any form.
The approve Function as Identity Handshake
The ERC-20 approve function is the natural point for identity exchange.
Alice is directly calling the BUCK contract – she can provide the
re-encrypted ElGamal ciphertext and the Chaum-Pedersen proof:
function approve(
address spender,
uint256 amount,
uint256[4] calldata E_spender, // ElGamal ciphertext (R.x, R.y, C.x, C.y)
uint256[3] calldata chaumPedersen // Fiat-Shamir proof (e, s1, s2)
) public returns (bool) {
_approve(msg.sender, spender, amount);
// Read the caller's registered credential from the registry
// CRITICAL: read from storage, never from calldata
uint256[4] memory E_caller = identityRegistry.getCredential(msg.sender);
uint256[2] memory pk_caller = identityRegistry.getIdentityKey(msg.sender);
uint256[2] memory pk_spender = identityRegistry.getIdentityKey(spender);
// Verify Chaum-Pedersen proof: E_spender encrypts same M as E_caller
require(
_verifyChaumPedersen(
E_caller, E_spender, pk_caller, pk_spender, chaumPedersen
),
"Re-encryption proof invalid"
);
// Store hash of the verified re-encrypted ciphertext for this pair
_receiptFragments[msg.sender][spender] = keccak256(
abi.encodePacked(E_spender)
);
// Emit ONLY the opaque ElGamal ciphertext (4 uint256 curve coordinates)
emit IdentityExchange(msg.sender, spender, E_spender);
return true;
}
What the public sees in the IdentityExchange event:
- Alice's address approved a spender (same as standard ERC-20 Approval)
- Four
uint256values encoding an ElGamal ciphertext – opaque curve point coordinates that only the spender can decrypt - No identity address, no public key, no linkable identifier
What the contract verified (in ~29,000 gas):
- The ciphertext contains Alice's real identity (Chaum-Pedersen proof passed against the registered credential read from the registry)
What the spender (Bob / pool operator) can do:
- Decrypt
E_bobusingsk_bob:M = C_b - sk_bob * R_b - Receive
identity_datafrom Alice via Holochain (encrypted for Bob) - Verify authenticity:
H(identity_data) * G == M(binds off-chain data to the on-chain proof chain) - Store verified identity for receipt construction on Holochain
Bilateral Identity Exchange
The transfer and transferFrom functions require that both parties'
identities are available to each other. For private accounts, this
means both must call approve:
// Alice (private) wants to transact with Bob (private): // Step 1: Alice approves Bob -- re-encrypts her identity for Bob buck.approve(bob, amount, E_alice_for_bob, chaumPedersenProof) // Step 2: Bob approves Alice -- re-encrypts his identity for Alice buck.approve(alice, 0, E_bob_for_alice, chaumPedersenProof) // Amount = 0: no spending authorization, just identity exchange
Both identity fragments must exist before BUCK can move. If Bob is a
public account (e.g., a Uniswap pool operator), step 2 is unnecessary:
isPublic(bob) == true satisfies the bilateral check, and Alice can
look up Bob's identity_data directly from the IdentityRegistry.
This means a public pool operator receives BUCK from any verified
private account that has done a single approve – no per-counterparty
setup on the pool's side. Two public accounts can transfer with no
approve at all – a standard ERC-20 transfer with identity
verification.
Receipt Construction: What the Contract Emits
The BUCK contract emits a minimal event that reveals only pseudonymous
addresses (which the ERC-20 Transfer event already reveals) plus a
reference to the pre-stored identity fragments:
event BuckTransferReceipt(
address indexed from,
address indexed to,
uint256 amount,
bytes32 fromIdentityHash, // keccak256 of from's ElGamal ciphertext for to
bytes32 toIdentityHash // keccak256 of to's ElGamal ciphertext for from
);
The fromIdentityHash and toIdentityHash are keccak256 hashes of the
opaque ElGamal ciphertexts stored during approve. They add no
linkability beyond what the Transfer event already provides (the
addresses are the same in both events).
The actual re-encrypted identity ciphertexts are retrievable:
- From the
IdentityExchangeevents (emitted duringapprove) - From Holochain (stored on the participants' source chains)
Only the counterparty (who has the identity private key to decrypt the ElGamal ciphertext) can recover the plaintext identity.
Canonical Receipts and Public Accounts
Both parties in a transfer hold each other's plaintext identity_data
(either from approve + Holochain, or from the public IdentityRegistry).
Both hold the transfer data (from the on-chain event). If the receipt
format is canonical (deterministic field order, encoding), either party
can independently construct the identical receipt and compute
H(receipt). The receipts match without coordination.
The receipt model varies by visibility mode:
| Sender | Receiver | Receipt construction |
|---|---|---|
| Public | Public | Fully on-chain. Reconstructable by |
| anyone from Transfer event + public | ||
| IdentityRegistry entries. No off-chain | ||
| component. | ||
| Public | Private | Private identity delivered via |
| Holochain. Both parties construct | ||
| canonical receipt off-chain. | ||
| Private | Private | Both identities delivered via |
| Holochain. Both parties construct | ||
| canonical receipt off-chain. |
For transfers involving private accounts, the contract cannot compute
H(receipt) because it never sees plaintext identities. The on-chain
BuckTransferReceipt event provides anchoring data (the ElGamal
ciphertext hashes from approve) that binds the off-chain receipt to
the on-chain transfer.
For two public accounts, no receipt hash is needed: every input to the
receipt is already public on-chain. The transfer is a standard ERC-20
transfer with identity verification – no Holochain wallet, no
off-chain coordination required.
The Complete transfer / transferFrom Flow
function transfer(address to, uint256 amount) public override returns (bool) {
require(identityRegistry.isVerified(msg.sender), "Sender not verified");
require(identityRegistry.isVerified(to), "Receiver not verified");
require(compliance.canTransfer(msg.sender, to, amount), "Compliance");
// Bilateral identity exchange: each party's identity must be
// available to the other -- via approve() or public registration.
require(
identityRegistry.isPublic(msg.sender)
|| _receiptFragments[msg.sender][to] != 0,
"Sender identity not available to receiver"
);
require(
identityRegistry.isPublic(to)
|| _receiptFragments[to][msg.sender] != 0,
"Receiver identity not available to sender"
);
_transfer(msg.sender, to, amount);
compliance.transferred(msg.sender, to, amount);
// Emit minimal receipt -- no identity data, just hashes of
// pre-stored re-encrypted ElGamal ciphertexts
emit BuckTransferReceipt(
msg.sender, to, amount,
_receiptFragments[msg.sender][to],
_receiptFragments[to][msg.sender]
);
return true;
}
The bilateral identity check enforces that both parties' identities are
available to their counterparty before any BUCK can move. A public
account (pool operator, insurer) is exempt from the approve requirement
because its identity_data is already world-readable in the
IdentityRegistry. This gives four transfer modes:
| Sender | Receiver | Approvals needed |
|---|---|---|
| Private | Private | Both approve each other |
| Private | Public | Only sender approves receiver |
| Public | Private | Only receiver approves sender |
| Public | Public | None – standard ERC-20 transfer |
For two public accounts, the transfer is a plain ERC-20 transfer with
identity verification – no Holochain wallet, no Chaum-Pedersen proofs, no
off-chain coordination. All identity data is already on-chain.
The transferFrom path applies the same bilateral check. The receipt
fragment hashes were stored during approve, so no additional identity
data passes through the DeFi router. The Chaum-Pedersen proof was verified
once (at approve time); subsequent transfers emit only the minimal
receipt event (~2,000 gas).
Holochain: Off-Chain Computation and Storage
Alice's wallet (a Holochain hApp) performs all credential derivation and transaction preparation:
- Credential derivation: Alice's PS-signed identity
(m, sigma)lives on her Holochain source chain. For each new account, the hApp rerandomizes the PS signature, generates a fresh key pair, creates an ElGamal encryption, and computes the NIZK proof. This runs entirely offline and can be batched – Alice can pre-generate credentials for future accounts. - Identity data storage: Alice's plaintext
identity_datais stored as a Private entry on her Holochain source chain, encrypted with her agent key and never published to the DHT. Only Alice's own agent can read it. This is the master copy from whichm = H(identity_data)can always be recomputed. - Credential storage: Each derived credential
(pk, E_alice, sigma', pi, sk)is also stored as a Private entry on the agent's source chain. The identity private keysk(an alt_bn128 scalar) is stored alongside the credential. The ElGamal ciphertext bindsmto the credential; the plaintextidentity_datathat givesmmeaning lives only in the Private entry, never on Ethereum. - Identity data delivery (the data channel): When Alice re-encrypts her
identity for Bob, her hApp also sends
identity_datato Bob's hApp via Holochain, encrypted under Bob's Holochain agent public key. Bob's hApp decrypts it, computesH(identity_data) * G, and checks equality withMrecovered from the on-chain ElGamal ciphertext. This verification binds the off-chain plaintext to the on-chain proof chain. The Holochain data channel carries the content; the Ethereum proof chain guarantees its authenticity. - Non-publication detection: Bob's wallet watches for
IdentityExchangeevents on Ethereum and checks for the corresponding DHT entry within a grace period. If Alice completes the on-chainapprovebut never publishes heridentity_datato the DHT, Bob's wallet can flag the account as non-compliant, issue a Holochain Warrant citing the on-chain tx hash, and optionally revoke the approval. The warrant is independently verifiable: any agent can confirm theIdentityExchangeevent exists on Ethereum but the corresponding DHT entry does not. Alice's non-publication does not protect her regardless – Bob can still decrypt \( M \) from the on-chain ciphertext, and the regulator can obtainidentity_datafrom the issuer. - Re-encryption: The hApp decrypts
E_alicelocally (Alice hassk_alice), extracts the message pointM, and re-encrypts for Bob:E_bob = (r' * G, r' * pk_bob + M). This is 2 scalar multiplications and 1 point addition – milliseconds on any device. - Proof generation: The Chaum-Pedersen proof is a Schnorr-family sigma protocol. Generation requires 2 scalar multiplications and 1 hash – instantaneous on any modern device. Unlike Groth16 SNARK proofs (which require minutes of circuit evaluation and a trusted setup ceremony), Chaum-Pedersen proof generation is negligible.
- Receipt storage: Full encrypted receipts (with decrypted identity
details, transaction metadata, purpose) are stored on both parties'
Holochain source chains. The on-chain
BuckTransferReceiptevent provides only an anchor hash.
Agent Isolation Model
Alice does not reuse a single Holochain agent across multiple BUCK accounts. For each Ethereum address she creates, her wallet application spawns a new Holochain agent:
- A fresh Holochain key pair (Ed25519) is generated.
- A new source chain is initialized.
- The hApp DNA is the same (same code, same hash), but the agent identity is distinct.
- Alice copies her
identity_datainto the new agent's Private store and derives a credential from it (rerandomizing her PS signature, generating a fresh alt_bn128 key pair, encrypting via ElGamal, computing the NIZK proof).
Why agent isolation matters: Holochain's DHT uses agent public keys as identifiers. If Alice used a single Holochain agent for all her BUCK accounts, a DHT observer could correlate them: "agent X stored credentials for addresses addr_1, addr_2, addr_3." With separate agents, each agent's DHT presence is independent. No Holochain observer can link Alice_1 to Alice_2, just as no Ethereum observer can link addr_1 to addr_2.
Practical operation: Alice's wallet application (a Holochain Launcher or custom conductor) manages multiple agent instances internally. From Alice's perspective, she sees a unified wallet with multiple accounts. Under the hood, each account is a separate Holochain agent with its own source chain. The wallet stores a master seed (protected by Alice's passphrase or biometrics) from which all agent keys are deterministically derived, allowing backup and recovery without storing raw keys.
What is NOT shared across agents: Holochain key pairs, source chain
entries, Ethereum addresses, alt_bn128 identity key pairs, ElGamal
ciphertexts, PS signature rerandomizations, NIZK proofs. What IS
shared (locally, within Alice's wallet, never on any network): Alice's
plaintext identity_data and the master PS signature (m, sigma) from
the issuer.
Holochain provides agent-centric, cryptographically auditable storage: the hApp DNA is identified by hash, so anyone can verify the exact code that runs on each participant's node. However, Holochain is not the trust anchor: Alice runs her own node and could run modified code. The on-chain verifications are the trust anchors – PS signature verification at registration and Chaum-Pedersen proof verification at transaction time are mathematically verifiable on-chain regardless of what software generated them. Holochain provides the execution environment; the proofs provide the guarantees.
Summary: What Each Layer Sees
| Layer | What it sees |
|---|---|
| Ethereum (everyone) | Transfer(from, to, amount) – pseudonymous addresses |
BuckTransferReceipt – same addresses + opaque hashes |
|
IdentityExchange – address + opaque ElGamal ctxt |
|
| Chaum-Pedersen proof verified (pass/fail) – no content | |
| BUCK contract | isVerified(from) == true, isVerified(to) == true |
| Chaum-Pedersen proof of re-encryption correctness | |
| keccak256 of re-encrypted ElGamal ciphertext (stored) | |
| Never sees plaintext identity | |
| Counterparty (Bob) | Decrypts ElGamal ciphertext -> learns Alice's identity |
| Constructs full receipt on Holochain | |
| Sender (Alice) | Knows her own identity, knows Bob's (from his approve) |
| Constructs full receipt on Holochain | |
| Holochain hApp | Derives credentials (PS rerandomization + NIZK) |
| Re-encrypts credential + generates proof locally | |
| Stores encrypted receipts on source chains | |
| Code identified by DNA hash (auditable) | |
| Court (with subpoena) | Compels Bob to decrypt his ElGamal ciphertext |
| On-chain proof record authenticates the decrypted result |
Cryptographic Receipts: 3-Party ECDH
While the BUCK contract emits only opaque ciphertext hashes on-chain,
the Holochain wallet layer constructs full receipts containing both
parties' decrypted identity_data and the transfer metadata. These
receipts are encrypted using 3-party ECDH (sender + receiver +
ephemeral transaction key) so that only the direct participants can
decrypt. A regulator cannot decrypt unilaterally – they hold two of
three ECDH components but lack the participants' shared secret,
making the surveillance cost O(N) per participant rather than O(1).
The canonical receipt format (deterministic JSON with sorted keys)
ensures both parties independently produce byte-identical receipts
with matching keccak256 hashes, enabling dispute resolution without
coordination.
The Three Keys
For a transfer from Alice to a DeFi pool operated by Bob:
| Key | Held by | Purpose |
|---|---|---|
k_s (sender) |
Alice | Sender's identity private key (alt_bn128) |
k_e (ephemeral) |
Deterministic | Derived from hash of on-chain receipt event; |
| reproducible by anyone who knows the event | ||
K_r (receiver) |
Bob (deployer) | Receiver's identity public key (from registry) |
The ephemeral key k_e is derived deterministically from the on-chain
receipt event data (which is immutable and publicly verifiable):
// All fields are from the on-chain BuckTransferReceipt event:
receipt_anchor = abi.encode(
from, to, amount,
fromIdentityHash, toIdentityHash,
block.number
)
k_e = keccak256(receipt_anchor) // deterministic "private key"
Note: receipt_anchor contains only pseudonymous addresses and opaque
hashes – no identity content. The identity public keys K_s and K_r
are looked up from the IdentityRegistry (on-chain, public), not emitted
in events.
Encryption Scheme
The wallet (Holochain hApp) computes the encryption key via ECDH:
// Alice's hApp computes (knows k_s, k_e; looks up K_r from registry):
K_r = identityRegistry.getIdentityKey(to) // Bob's identity public key
shared_1 = ECDH(k_s, K_r) // sender-receiver shared secret
shared_2 = ECDH(k_e, K_r) // ephemeral-receiver shared secret
encryption_key = keccak256(shared_1 || shared_2)
// Construct the full receipt with decrypted identity data:
full_receipt = {
from, to, amount, block.number, tx_hash, // from on-chain event
sender_identity: decrypt(E_alice), // from Alice's source chain
receiver_identity: decrypt(E_bob_for_alice), // from Bob's approve
purpose: "Uniswap V3 BUCK->USDT swap"
}
// Encrypt:
ciphertext = AES-GCM(encryption_key, encode(full_receipt))
The encrypted receipt is stored on Holochain (both parties' source chains). A commitment hash can optionally be emitted on-chain to anchor the receipt:
event ReceiptCommitment(
bytes32 indexed transferHash, // hash of the BuckTransferReceipt event
bytes32 receiptHash // hash of the encrypted full receipt
);
Who Can Decrypt
Sender (Alice)
Alice has k_s (her identity private key) and can recompute k_e from
the on-chain receipt event:
k_e = keccak256(receipt_anchor) // deterministic from on-chain data K_r = identityRegistry.getIdentityKey(to) // look up receiver's key shared_1 = ECDH(k_s, K_r) // she has k_s shared_2 = ECDH(k_e, K_r) // she has k_e encryption_key = keccak256(shared_1 || shared_2)
Receiver / Pool Operator (Bob)
Bob has k_r (his identity private key) and looks up Alice's identity
public key from the registry:
K_e = G * k_e // computable: k_e from receipt anchor K_s = identityRegistry.getIdentityKey(from) // Alice's identity public key shared_1 = ECDH(k_r, K_s) // he has k_r shared_2 = ECDH(k_r, K_e) // he has k_r encryption_key = keccak256(shared_1 || shared_2)
Court-Compelled Decryption (Subpoena of Pool Operator)
A court subpoenas Bob to decrypt a specific transaction receipt:
// Court provides: the transaction hash // Bob looks up: the BuckTransferReceipt event from that transaction // Bob computes (using his identity private key k_r): K_s = identityRegistry.getIdentityKey(from) K_e = G * keccak256(receipt_anchor) shared_1 = ECDH(k_r, K_s) shared_2 = ECDH(k_r, K_e) encryption_key = keccak256(shared_1 || shared_2) receipt = AES-GCM-decrypt(encryption_key, ciphertext_from_holochain)
Bob reveals only the decrypted receipt. He never reveals k_r. He
cannot decrypt receipts where he is not a party.
Regulatory Escrow (Optional)
A regulatory authority's public key K_reg adds a third shared secret:
shared_3 = ECDH(k_e, K_reg) encryption_key = keccak256(shared_1 || shared_2 || shared_3)
The regulator can compute shared_3 (they have k_reg, and K_e is
deterministic from the on-chain event). They can also compute
shared_2 = ECDH(k_e, K_r) since the ephemeral key k_e is
deterministic from public on-chain data. But they cannot compute
shared_1 = ECDH(sk_sender, K_receiver) – this requires the
sender's or receiver's private key. Without a participant's
cooperation, the regulator holds two of three ECDH components and
cannot reconstruct the encryption key. No unilateral surveillance.
This is the deliberate design: a court compels a participant to decrypt; the escrow key merely lets the regulator verify the decryption (by independently recomputing the same key once a participant cooperates). Contrast with custodial key escrow, where the authority holds a master decryption key and can surveil at O(1) cost. Here the cost is O(N) – one subpoena per participant, per transaction.
Play-by-Play: BUCK/USDT Swap on Uniswap
A complete BUCK/USDT swap, step by step: from Alice's initial KYC
ceremony through the final on-chain transfer, showing every piece of
data, where it resides, and what each party does. Alice is a private
account; Bob's pool is public (isPublic = true). The
Private-to-Public transfer mode means Alice calls approve once
(~29K gas for Chaum-Pedersen verification), no approve is needed
from Bob's side, and the transferFrom performs only boolean flag
checks with no cryptography. Each step shows the on-chain gas cost,
the Holochain wallet actions, and what an observer (Eve) can and
cannot see.
Alice holds 1000 BUCK and wants to swap 500 BUCK for USDT. Bob has deployed a BUCK/USDT Uniswap V3 pool.
Prerequisites (One-Time Setup)
Alice:
1. Completed KYC with trusted issuer (off-chain ceremony)
2. Issuer PS-signs Alice's identity: sigma = PS.Sign(sk_issuer, m)
where m = H(identity_data)
3. Alice receives (m, sigma) and stores in Holochain wallet
4. Alice's wallet derives a credential for this account (offline):
- Rerandomizes PS signature: sigma' = (t * sigma_1, t * sigma_2)
- Generates fresh identity key pair (sk_alice, pk_alice)
- Encrypts: E_alice = (r * G, m * G + r * pk_alice)
- Computes NIZK proof pi linking sigma' to E_alice
5. Registers on-chain (~235K gas):
identityRegistry.registerCredential(
alice_wallet, pk_alice, E_alice, sigma', pi)
6. identityRegistry.isVerified(alice_wallet) == true
Bob (pool deployer):
1. Completed KYC (same ceremony as Alice)
2. Derived credential for his account (same offline process)
3. Credential registered in IdentityRegistry (~235K gas)
4. Created BUCK/USDT pool via Uniswap factory
-> pool deployed at address 0xPOOL
5. Derived and registered a separate credential for the pool
(from same PS-signed identity, via the Identity Fountain):
identityRegistry.registerCredential(
0xPOOL, pk_bob_pool, E_bob_pool, sigma'_pool, pi_pool)
6. identityRegistry.isVerified(0xPOOL) == true
The Swap Transaction
Step 1: Alice Approves the Router (Identity Handshake)
Alice's wallet (Holochain hApp) prepares the identity exchange locally,
then Alice calls approve on the BUCK contract:
// 1. Off-chain (Holochain hApp on Alice's node -- milliseconds):
// - Read E_alice from her source chain
// - Decrypt: M = C_a - sk_alice * R_a (extract message point)
// - Look up the pool operator's identity public key pk_bob
// - Re-encrypt: E_bob = (r' * G, r' * pk_bob + M)
// - Generate Chaum-Pedersen proof:
// "E_bob encrypts the same M as E_alice"
// (2 scalar muls + 1 hash -- instantaneous)
// 2. On-chain:
buck.approve(
uniswapRouter, // spender
500e18, // amount
[R_b.x, R_b.y, C_b.x, C_b.y], // E_bob (ElGamal ciphertext)
[e, s1, s2] // Chaum-Pedersen proof
)
The BUCK contract:
1. Sets allowance[alice][uniswapRouter] = 500e18 2. Reads E_alice from IdentityRegistry (PS-verified, immutable) 3. Verifies Chaum-Pedersen proof: E_bob encrypts same M as E_alice (4 ecMul + 4 ecAdd + 1 keccak256 = ~29,000 gas) 4. Stores keccak256(E_bob) in _receiptFragments[alice][0xPOOL] 5. Emits IdentityExchange(alice, 0xPOOL, E_bob) -- the event contains ONLY the opaque ElGamal ciphertext -- no identity address, no public key, no linkable identifier
This is the critical moment. Alice is directly calling the BUCK
contract, so she can provide the re-encrypted ciphertext and proof.
By the time transferFrom is called later (by the router), the
verified identity fragment is already stored.
Note: the pool (0xPOOL) is a public account – its identity_data
is registered publicly in the IdentityRegistry. Alice's wallet can
look it up directly, so the pool does not need to call approve for
Alice. The bilateral identity check in transferFrom passes because
isPublic(0xPOOL) == true satisfies the pool-side requirement.
Step 2: Alice Calls the Router
// Alice initiates the swap (standard Uniswap call -- no BUCK-specific data)
uniswapRouter.exactInputSingle(
tokenIn: BUCK,
tokenOut: USDT,
fee: 3000, // 0.3% fee tier
recipient: alice,
amountIn: 500e18,
amountOutMinimum: 490e6, // slippage protection
sqrtPriceLimitX96: 0
)
No identity data passes through this call. The router is a standard Uniswap contract that knows nothing about BUCK identity.
Step 3: Router Calls BUCK.transferFrom (Minimal Receipt Emission)
Inside the router, the swap triggers:
buck.transferFrom(alice, 0xPOOL, 500e18)
The BUCK contract executes (no identity data passes through the router):
function transferFrom(address from, address to, uint256 amount) ...
{
_spendAllowance(from, msg.sender, amount);
require(identityRegistry.isVerified(from), "Sender not verified");
require(identityRegistry.isVerified(to), "Receiver not verified");
require(compliance.canTransfer(from, to, amount), "Compliance");
_transfer(from, to, amount);
compliance.transferred(from, to, amount);
// Emit minimal receipt -- ONLY hashes of pre-stored ElGamal ciphertexts
emit BuckTransferReceipt(
from, to, amount,
_receiptFragments[from][to], // keccak256 of Alice's E_bob
_receiptFragments[to][from] // keccak256 of Bob's E_alice
);
return true;
}
What the public sees: the same from/to/amount as the standard ERC-20 Transfer event, plus two opaque hashes. No identity addresses. No public keys. No linkable identity information beyond the pseudonymous Ethereum addresses.
What the contract verified (during approve, earlier): the
Chaum-Pedersen proof that Alice's re-encrypted ElGamal ciphertext
encrypts the same identity as her registered credential.
Step 4: Wallet Constructs the Full Receipt (Off-Chain)
Alice's wallet (Holochain hApp) observes the BuckTransferReceipt
event and the IdentityExchange events to construct the full receipt:
// 1. From on-chain events (trusted, immutable):
transfer_data = {from, to, amount, block.number, tx_hash}
receipt_hashes = {fromIdentityHash, toIdentityHash}
// 2. From IdentityExchange event (emitted during approve):
E_bob = Alice's re-encrypted identity for Bob (ElGamal ciphertext)
// 3. Alice already knows her own identity (she submitted it at KYC):
alice_identity = alice_identity_data // local, never on-chain
// 4. From Bob's IdentityExchange (if Bob also did approve for Alice):
E_alice_from_bob = Bob's re-encrypted identity for Alice
M_bob = C_b' - sk_alice * R_b' // Alice decrypts with her key
bob_identity_data = receive_via_holochain(bob) // off-chain data channel
assert H(bob_identity_data) * G == M_bob // bind to on-chain proof
// 5. Construct full receipt with decrypted identities
full_receipt = {
transfer: transfer_data,
sender_name: alice_identity.name, // "Alice Johnson"
receiver_name: bob_identity.name, // "Bob Smith, DeFi Ops Inc."
operation: "Uniswap V3 swap BUCK -> USDT",
pool: "0xPOOL",
timestamp: block.timestamp
}
// 6. Encrypt the full receipt with 3-party ECDH
// (see Cryptographic Receipts section)
receipt_anchor = abi.encode(from, to, amount, receipt_hashes, block.number)
k_e = keccak256(receipt_anchor)
K_bob = identityRegistry.getIdentityKey(to) // look up from registry
shared_1 = ECDH(sk_alice, K_bob)
shared_2 = ECDH(k_e, K_bob)
encryption_key = keccak256(shared_1 || shared_2)
ciphertext = AES-GCM(encryption_key, encode(full_receipt))
// 7. Store on Holochain (both parties' source chains)
holochain.store(alice_chain, ciphertext)
holochain.store(bob_chain, ciphertext)
Step 5: Pool Executes the Swap
The Uniswap pool sends USDT to Alice. Since USDT is not an Alberta Buck token, the USDT transfer has no BUCK identity requirements (it follows whatever rules USDT imposes, which is typically none).
Step 6: Completed State
On-chain (public): - ERC-20 Transfer event: alice_addr -> 0xPOOL, 500 BUCK - BuckTransferReceipt: same addresses + two opaque bytes32 hashes - IdentityExchange (from approve): alice_addr + opaque ElGamal ciphertext - Swap event: BUCK/USDT pool, 500 BUCK in, ~495 USDT out - Chaum-Pedersen proof verified (29K gas, no identity content leaked) Off-chain (Holochain, encrypted): - Full encrypted receipt on Alice's and Bob's source chains - Alice's re-encrypted identity (ElGamal ciphertext, only Bob can decrypt) - Bob's re-encrypted identity (ElGamal ciphertext, only Alice can decrypt) - PS-signed identity on issuer's source chain (audit trail) What anyone can see: - Two pseudonymous addresses transacted 500 BUCK - Both addresses pass isVerified (they are KYC'd participants) - Opaque ElGamal ciphertexts and hashes (indistinguishable from random) - A Chaum-Pedersen proof was verified (the ciphertexts are genuine) What Alice can see: - Her own identity (trivially) - Bob's identity (decrypt his ElGamal ciphertext with her key) - Full receipt with names, amounts, purpose What Bob can see: - His own identity (trivially) - Alice's identity (decrypt her ElGamal ciphertext with his key) - Full receipt with names, amounts, purpose What a court can compel (via subpoena of Bob): - Bob decrypts Alice's ElGamal ciphertext for the specific transaction - On-chain Chaum-Pedersen proof record authenticates the result - Reveals Alice's identity for that one receipt - Bob never reveals his private key What the public CANNOT see: - Alice's real name or identity details - Bob's real name (as pool operator) - Any linkable identity across transactions - The purpose or terms of the transaction
Edge Cases and Design Considerations
Practical deployment scenarios beyond the simple Alice-to-Bob model: flash loans (atomic borrow-repay cycles), multi-hop swaps (BUCK through intermediate pools), contract-to-contract transfers (yield aggregators), epoch-based credential expiry, Holochain integration details (private entry storage, agent isolation, DHT identity delivery and non-publication detection), the 3-party ECDH regulatory escrow model (O(N) surveillance cost, no unilateral decryption), and the alt_bn128 security horizon (~100-bit pairing security, BLS12-381 migration path via EIP-2537).
Flash Loans and Atomic Transactions
A flash loan borrows and repays in a single transaction. The borrower's address must be verified, and the lending contract must be registered. The receipt covers the full borrow-repay cycle as a single atomic event.
Multi-Hop Swaps
A swap routed through BUCK -> WETH -> USDT involves two BUCK transfers (BUCK -> pool1, pool1 -> pool2 if intermediate). Each BUCK transfer generates its own encrypted receipt. The router contract must also be registered if it holds BUCK transiently.
Contract-to-Contract Transfers
When one DeFi contract sends BUCK to another (e.g., a yield aggregator moving BUCK between pools), both contracts must be registered. The receipt identifies both contracts' deployers as the parties. This creates a clear chain of custody: every BUCK movement has an identified legal operator at each end.
Wrapping and Bridging
If BUCK is wrapped (WBUCK) for use on another chain, the wrapping contract must be registered. The wrap/unwrap generates receipts. On the destination chain, the bridged BUCK may operate under different identity rules (or no identity rules if the destination chain doesn't enforce ERC-3643). This is a known limitation – the Alberta Buck's identity guarantees only hold on chains where the IdentityRegistry is deployed.
Gas Costs
The design has three gas-consuming identity operations:
| Operation | Cost (~gas) | When |
|---|---|---|
registerCredential with PS verify |
~235,000 gas | Once per account |
| (PS pairing: ~181K + NIZK: ~44K) | ||
approve with Chaum-Pedersen verify |
~75,000 gas | Once per pair |
| (proof verify: ~29K + std approve: ~46K) | ||
BuckTransferReceipt event |
~2,000 gas | Per transfer |
| (2 indexed addresses + 3 uint256) |
Credential registration uses the ecPairing precompile to verify the
Pointcheval-Sanders signature and NIZK proof (235,000 gas, once per
account). The Chaum-Pedersen proof verification uses ~ecMul / ecAdd
(~29,000 gas per counterparty pair). Subsequent transfers emit only the
minimal receipt event (~2,000 gas) with no additional proof work.
All encrypted identity data and full receipts are stored on Holochain, not
on Ethereum. The only identity-related data emitted on-chain is the compact
ElGamal ciphertext (4 curve coordinates = 128 bytes of calldata) during
approve, and two bytes32 hashes during each transfer.
Privacy of Pool Deployer Identity
The pool deployer's ElGamal credential is stored in the IdentityRegistry
alongside the pool contract's address. The credential E_deployer is an
opaque ciphertext – anyone can see it on-chain, but no one can decrypt it
without the deployer's identity private key.
What is publicly visible: "0xPOOL is operated by a verified entity" (because
isVerified(0xPOOL) == true). What is not visible: who that entity is.
The deployer's real identity is revealed only in the ElGamal ciphertexts
re-encrypted for specific counterparties during approve handshakes.
If a deployer wants public identification (e.g., "DeFi Ops Inc., Alberta"), they can register a separate plaintext identity claim alongside their encrypted credential. This is the expected case for commercial DeFi operators – public identity builds trust and attracts liquidity.
alt_bn128 Security Horizon
The alt_bn128 curve (BN254) offers ~128-bit security for discrete logarithm in G_1 but only ~100-bit security against pairing-based attacks, due to Kim-Barbulescu tower-NFS improvements (2016) to the Number Field Sieve in extension fields. This affects the PS signature verification (which uses pairings at registration) but not the Chaum-Pedersen proof (which uses only G_1 scalar multiplications at transaction time and remains at full ~128-bit security).
This is not specific to Alberta Buck. Every Ethereum application
using the ecPairing precompile – Groth16 SNARK verifiers (zkSync,
Polygon zkEVM), BLS signature schemes, any pairing-based construction
– faces the same constraint. The alt_bn128 precompiles are the only
pairing-capable curve available on-chain until EIP-2537 (BLS12-381
precompiles) is deployed.
Three mitigations apply:
- Epoch-based credential expiry: PS signatures are verified once at registration and carry an expiry epoch. An attacker who invests computational resources to break a pairing equation recovers a single credential that has likely already expired. The Identity Fountain's renewal model limits the value of any single break.
- DLog security is unaffected: Per-transaction Chaum-Pedersen proofs rely on discrete logarithm hardness in G_1, which remains at ~128-bit security. An attacker who breaks pairings cannot forge re-encryption proofs or decrypt ElGamal ciphertexts.
- BLS12-381 migration path: EIP-2537 introduces precompiles for
BLS12-381 (~128-bit pairing security). When deployed, credential
registration migrates to BLS12-381 for PS verification while the
Chaum-Pedersen layer continues on alt_bn128 (or also migrates).
The architecture's separation of registration-time pairings from
transaction-time scalar multiplications makes this migration
straightforward – only the
registerCredentialfunction changes.
The ~100-bit pairing security is adequate for the current threat model. The practical cost of a tower-NFS attack on BN254 pairings remains far beyond the value of any single Alberta Buck credential, particularly given epoch-based expiry. The system shares this constraint with the entire Ethereum L2 scaling ecosystem.
Alternative Approaches Considered
Five cryptographic alternatives were evaluated before settling on the ElGamal + Pointcheval-Sanders + Chaum-Pedersen architecture: Pedersen Commitments with Groth16 SNARKs, Proxy Re-Encryption (NuCypher Umbral), BBS+ Signatures with Selective Disclosure, Camenisch-Shoup Verifiable Encryption, and Pedersen Equality Proofs. Each is assessed on per-transaction gas cost, setup requirements, proof generation time, targeted decryption support, and implementation complexity. The comparison table shows ElGamal Chaum-Pedersen wins on per-transaction gas (~29K vs. ~200K+ for SNARK-based alternatives), requires no trusted setup, and generates proofs instantaneously. Combined with PS rerandomizable signatures for one-time credential registration (~235K gas), the system achieves both cross-account unlinkability and per-transaction re-encryption correctness without the gas burden or trusted setup of alternatives.
Pedersen Commitments + Groth16 ZK Proofs
In this approach, the issuer stores a Pedersen commitment C = v*G + r*H
on-chain. Alice proves in zero knowledge (via a Groth16 SNARK) that her
re-encrypted ciphertext E_bob encrypts the same value v committed in C.
Advantages:
- Extremely flexible: the ZK circuit can prove arbitrary predicates alongside re-encryption correctness (age > 18, jurisdiction membership, credit score in range, etc.)
- Information-theoretically hiding (Pedersen commitments hide
vperfectly, vs. ElGamal's computational hiding) - Well-supported toolchain (circom, snarkjs, Hardhat plugins)
Why Chaum-Pedersen is superior for Alberta Buck:
- Gas cost: Groth16 verification requires the
ecPairingprecompile (~113,000 gas base + per-pair costs), totaling ~200,000-300,000 gas. Chaum-Pedersen costs ~29,000 gas – 7-10x cheaper. - Trusted setup: Groth16 requires a multi-party computation ceremony to generate proving/verification keys. A compromised ceremony allows forged proofs – the one thing the system cannot tolerate. Chaum-Pedersen has no setup of any kind.
- Proof generation time: Groth16 proof generation takes seconds to minutes (circuit evaluation, witness computation, FFTs over large fields). Chaum-Pedersen proof generation is 2 scalar multiplications and 1 hash – milliseconds on a phone.
- Complexity: Groth16 requires circuit definition (R1CS/circom), a prover library, and careful constraint engineering. A bug in the circuit silently compromises soundness. Chaum-Pedersen is ~50 lines of elliptic curve arithmetic with a well-understood security proof.
- Unnecessary generality: Alberta Buck needs exactly one thing: proof that two ElGamal ciphertexts encrypt the same message point. Groth16 can prove anything in NP; that generality is wasted here and only adds attack surface.
Proxy Re-Encryption (NuCypher Umbral)4
In PRE, Alice generates a re-encryption key rk_{A->B} that allows an
untrusted proxy to transform E_alice into E_bob without decrypting.
Umbral includes NIZK proofs of correct re-encryption.
Advantages:
- Alice does not need to be online at re-encryption time (the proxy acts on her behalf)
- Threshold PRE distributes trust across multiple proxies (no single point of compromise)
- Algebraic NIZK proofs are efficient (comparable gas cost to Chaum-Pedersen)
Why Chaum-Pedersen is superior for Alberta Buck:
- Alice is always online: in the Alberta Buck model, Alice calls
approvedirectly – she is necessarily online. The proxy delegation feature of PRE is unnecessary complexity. - No proxy metadata leakage: even with threshold PRE, the proxies learn metadata (who is re-encrypting for whom, how often). Direct re-encryption eliminates this metadata channel entirely.
- Simpler key management: PRE requires generating and distributing re-encryption keys per counterparty pair. Direct ElGamal re-encryption uses only the existing identity key pairs already registered on-chain.
- Protocol complexity: Umbral manages capsules, key fragments, and proxy coordination. Direct re-encryption with Chaum-Pedersen is two scalar multiplications and a sigma protocol – no capsules, no fragments, no proxies.
- PRE remains valuable in other contexts (e.g., encrypted email where the sender may be offline), but Alberta Buck's on-chain interaction model makes it unnecessary.
BBS+ Signatures with Selective Disclosure
BBS+ (pairing-based multi-message signatures) allows an issuer to sign a vector of attributes. Alice can selectively disclose specific attributes while hiding others, with ZK proofs of signature validity. The W3C Verifiable Credentials standard is converging on BBS+ for exactly this use case.
Advantages:
- Attribute-level granularity: prove "jurisdiction = Alberta" without revealing name or ID number
- Unlinkable presentations (different proofs from the same credential cannot be correlated)
- Ecosystem alignment with W3C VC / DID standards
Why Chaum-Pedersen is superior for Alberta Buck:
- Gas cost: BBS+ verification requires pairing operations (~113,000+ gas). Chaum-Pedersen uses only scalar multiplications (~29,000 gas).
- Selective disclosure is the wrong primitive: Alberta Buck transfers require the full identity to be re-encrypted for the counterparty (for court-recoverable receipts). Selective attribute hiding would defeat the purpose: the counterparty needs the whole identity, and a court needs the whole identity.
- Different trust model: BBS+ proves "I hold a valid credential with these properties." Alberta Buck needs "this ciphertext contains my specific issuer-certified identity." The latter is a re-encryption correctness proof, not a selective disclosure proof.
- Cross-account unlinkability is already solved: Pointcheval-Sanders rerandomizable signatures provide unlinkable credential derivation for different accounts. Within a single account, re-encryptions share a common Ethereum address regardless of the credential scheme, so BBS+ presentation unlinkability adds nothing.
- BBS+ could complement Chaum-Pedersen in the future – e.g., for compliance checks that verify jurisdiction eligibility without full identity disclosure. But it does not replace the core re-encryption mechanism.
Camenisch-Shoup Verifiable Encryption
A purpose-built primitive: encrypt a value and simultaneously prove that the plaintext satisfies a public relation, without revealing it.
Advantages:
- Theoretically clean: directly solves "encrypt for Bob, prove to everyone it's the right value"
- Can prove arbitrary relations on the encrypted plaintext
Why Chaum-Pedersen is superior for Alberta Buck:
- Camenisch-Shoup is the general framework; Chaum-Pedersen is its optimal specialization for the "same plaintext" relation. When the relation is "same plaintext as another ElGamal ciphertext in the same group," the Chaum-Pedersen protocol is the canonical, minimal-cost instantiation.
- General Camenisch-Shoup constructions are more complex and less efficient.
Pedersen Equality Proofs (Homomorphic Comparison)5
Pedersen commitments support homomorphic equality checking: given
C_1 = v*G + r_1*H and C_2 = v*G + r_2*H, revealing delta_r = r_1 - r_2
lets the verifier check C_1 - C_2 == delta_r * H without learning v.
Advantages:
- Extremely cheap (1 point addition, 1 scalar multiplication)
- Information-theoretically hiding
Why this is insufficient for Alberta Buck:
- Pedersen commitments are commitments, not encryptions. They hide the value but do not allow a specific party to decrypt. Alberta Buck needs Bob to recover Alice's identity, not just to verify that two opaque commitments match. ElGamal provides both hiding and targeted decryption.
- Revealing
delta_rto prove equality leaks the randomness difference, which is acceptable for on-chain verification but means the commitment scheme cannot support multiple independent equality proofs without additional blinding (each proof leaks one linear relation on the randomness).
Comparison Summary
| Approach | On-chain gas | Proof gen | Setup | Targeted | Sufficient |
|---|---|---|---|---|---|
| decryption | alone? | ||||
| ElGamal Chaum-Pedersen | ~29K | ms | none | yes | yes |
| Groth16 SNARK | ~200-300K | sec-min | trusted | yes | yes |
| Umbral PRE | ~30-50K | ms | none | yes | yes |
| BBS+ | ~150-200K | ms | pairing | no (proves | no |
| params | properties) | (complement) | |||
| Camenisch-Shoup | ~50-100K | ms | none | yes | yes |
| Pedersen equality | ~7K | ms | none | no | no |
ElGamal Chaum-Pedersen wins on per-transaction gas cost, has zero setup requirements, generates proofs instantly, supports targeted decryption, and requires minimal implementation. Combined with Pointcheval-Sanders rerandomizable signatures for credential derivation (one-time ~235K gas at registration), the system achieves both cross-account unlinkability and per-transaction re-encryption correctness – without the gas burden or trusted setup of SNARK-based alternatives.
Summary: Identity Requirement by Risk Level
The table below maps every Alberta Buck operation to its risk level, identity mode, and receipt format. The design principle: identity requirements scale with the damage a malicious actor could cause. Governance and BuckCredit operations require full public identity; transfers and DeFi swaps require anonymous-valid identity with encrypted receipts; read-only operations are permissionless. In all cases, the on-chain proof chain ensures that identity can be recovered under subpoena without requiring ongoing cooperation from any party.
| Risk level | Operations | Identity mode | Receipt |
|---|---|---|---|
| Highest | BuckCredit creation/update, | Public | On-chain event + |
| oracle claims, governance | public record | ||
| High | Pool deployment, compliance changes | Public | On-chain event |
| Medium | BUCK transfer, DeFi swap, | Anonymous-valid | Encrypted 3-party |
| add/remove liquidity | ECDH receipt | ||
| Low | BUCK burn, credit activation | Anonymous-valid | On-chain event |
| None | BuckK compute, read oracle, | Permissionless | On-chain event |
| view balances |
Footnotes
ElGamal Encryption. ElGamal, T. "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms." IEEE Transactions on Information Theory, 1985. Semantic security (IND-CPA) under the Decisional Diffie-Hellman assumption. Alberta Buck uses ElGamal over the alt_bn128 curve (BN254), which is supported by Ethereum's EIP-196/197 precompiled contracts for efficient on-chain verification.
Pointcheval-Sanders Signatures. Pointcheval, D. and Sanders, O. "Short Randomizable Signatures." CT-RSA 2016, LNCS 9610, pp. 111-126. Rerandomizable signatures: given a valid signature sigma on message m, anyone can compute sigma' = (t * sigma_1, t * sigma_2) that is a valid, statistically unlinkable signature on the same m. Verification uses a bilinear pairing equation, compatible with Ethereum's alt_bn128 (BN254) ecPairing precompile.
Chaum-Pedersen Protocol. Chaum, D. and Pedersen, T.P. "Wallet Databases with Observers." CRYPTO 1992, LNCS 740, pp. 89-105. The Chaum-Pedersen protocol proves equality of discrete logarithms (equivalently, that two ElGamal ciphertexts encrypt the same message) in zero knowledge. Made non-interactive via the Fiat-Shamir heuristic.
Umbral: A Threshold Proxy Re-Encryption Scheme. NuCypher. Reference implementation: https://github.com/nucypher/pyUmbral Whitepaper: https://raw.githubusercontent.com/nucypher/umbral-doc/master/umbral-doc.pdf
Pedersen Commitments and Bulletproofs. Bulletproofs: Short Proofs for Confidential Transactions and More. Bunz, Bootle, Boneh, Poelstra, Wuille, Maxwell. Overview: https://tlu.tarilabs.com/cryptography/the-bulletproof-protocols Pedersen commitments in confidential transactions: https://www.nccgroup.com/research/on-the-use-of-pedersen-commitments-for-confidential-payments/
ERC-3643 (T-REX): Token for Regulated EXchanges. The on-chain identity framework (IdentityRegistry, TrustedIssuersRegistry, ClaimTopicsRegistry) used by Alberta Buck for credential management. https://eips.ethereum.org/EIPS/eip-3643