Identity-Linked Token Protocol

Jake Jones ([email protected])

Abstract

This proposal extends the Enhanced Mandala Token Protocol (BRC-107) with identity certificate integration based on BRC-52/53. It enables tokens to enforce real-world compliance requirements, KYC/AML regulations, and identity-based access controls while preserving privacy through selective field revelation. The protocol supports regulated security tokens, accredited investor requirements, geographic restrictions, and identity-based recovery mechanisms, all validated through SPV-friendly cryptographic proofs.

Motivation

Current token systems on BSV lack native integration with identity verification, making regulatory compliance difficult and limiting adoption for security tokens and regulated assets. While BRC-52/53 provides a robust identity certificate system, there's no standard for linking these certificates to token ownership and transfers.

This proposal addresses:

  • Regulatory compliance for security tokens requiring KYC/AML

  • Accredited investor verification for restricted offerings

  • Geographic restrictions for regulatory jurisdictions

  • Identity-based recovery for lost keys

  • Privacy-preserving compliance through selective revelation

  • Fraud prevention through identity linkage

Specification

Identity-Bound Token Types

We define three levels of identity requirements for tokens:

  1. Open Tokens: No identity requirements (backward compatible with BRC-92/BRC-107)

  2. Verified Tokens: Require valid BRC-52 certificate

  3. Restricted Tokens: Require specific certificate fields or types

Enhanced Genesis Output

The genesis transaction establishes identity requirements:

Where:

  • issuerCertificateHash: SHA-256 hash of issuer's BRC-52 certificate

  • complianceRules: Encoded rules for token transfers

  • identityCommitment: H(assetId || issuerCertificate || complianceRules || maxSupply)

Compliance Rules Structure

Identity-Linked Token Output

Where:

  • recipientCertificateHash: SHA-256 hash of recipient's BRC-52 certificate

  • identityCommitment: H(assetId || amount || certificateHash || prevTxid)

Identity-Aware Transfer Protocol

When transferring identity-linked tokens, the sender provides:

Verification Protocol

Recipients and overlays MUST verify:

1. Standard Token Checks (from BRC-106)

  • Commitment verification

  • Conservation check

  • Merkle proof validation

2. Identity Checks

Selective Field Revelation

Certificate holders reveal only required fields:

  1. Determine Required Fields: Based on token's compliance rules

  2. Encrypt for Recipient: Using BRC-52/53 key derivation

  3. Include in Transfer: Add encrypted keys to certificate keyring

  4. Recipient Decrypts: Using their identity key

Example revealing only country for geographic restriction:

Identity-Based Recovery

Tokens can include recovery conditions:

Where:

  • recoveryCommitment: H(certificateType || recoveryFields || recoveryPubkey)

  • recoveryDelay: Time lock before recovery (e.g., 30 days)

Certificate Levels and Permissions

Use Cases

1. Security Token Offering (STO)

2. Geographic Restrictions

3. Age-Restricted Assets

4. Institutional Trading

Privacy Considerations

Zero-Knowledge Proofs

For sensitive compliance checks, support ZK proofs:

  • Prove age > 18 without revealing exact age

  • Prove accredited status without revealing net worth

  • Prove country membership without revealing specific country

Encrypted Field Storage

All certificate fields remain encrypted until revelation:

  • Only revealed fields are decrypted

  • Revelation is counterparty-specific

  • No permanent plaintext exposure

Pseudonymous Compliance

Users can maintain pseudonymity while proving compliance:

  • Certificate links to pubkey, not real name

  • Only certifier knows real identity

  • Selective revelation preserves privacy

Security Considerations

Certificate Validation

  • Always verify certificate signatures

  • Check revocation status via UTXO

  • Validate certifier is trusted

  • Ensure certificate hasn't expired

Replay Protection

  • Include prevTxid in commitments

  • Timestamp compliance attestations

  • Use nonces for uniqueness

Key Compromise

  • Certificate revocation via UTXO spending

  • Recovery mechanisms for token access

  • Time-locked recovery periods

Migration and Compatibility

Backward Compatibility

  • Open tokens work without identity

  • Existing BRC-92/106 tokens unaffected

  • Optional identity for gradual adoption

Migration Path

  1. Phase 1: Deploy identity-aware wallets

  2. Phase 2: Certifiers issue BRC-52 certificates

  3. Phase 3: Token issuers adopt compliance rules

  4. Phase 4: Overlays enforce identity requirements

  5. Phase 5: Full ecosystem adoption

Implementation Examples

Creating Identity-Linked Token

Transferring with Compliance

Test Vectors

Identity Commitment

Compliance Check

References

  • BRC-52: Identity Certificates

  • BRC-53: Certificate Creation and Revelation

  • BRC-92: Mandala Token Protocol

  • BRC-107: Enhanced Mandala Token Protocol

  • BRC-43: Security Levels, Protocol IDs, Key IDs and Counterparties

  • BRC-2: Data Encryption and Decryption

  • BRC-3: Digital Signature Creation and Verification

Implementations

Reference implementations:

  • TypeScript: Coming Soon

  • Go: Coming Soon

  • Python: Coming Soon

Last updated

Was this helpful?