Identity-Linked Token Protocol
Jake Jones ([email protected])
Abstract
This proposal extends the Enhanced Mandala Token Protocol (BRC-107) with identity certificate integration based on BRC-52/53. It enables tokens to enforce real-world compliance requirements, KYC/AML regulations, and identity-based access controls while preserving privacy through selective field revelation. The protocol supports regulated security tokens, accredited investor requirements, geographic restrictions, and identity-based recovery mechanisms, all validated through SPV-friendly cryptographic proofs.
Motivation
Current token systems on BSV lack native integration with identity verification, making regulatory compliance difficult and limiting adoption for security tokens and regulated assets. While BRC-52/53 provides a robust identity certificate system, there's no standard for linking these certificates to token ownership and transfers.
This proposal addresses:
Regulatory compliance for security tokens requiring KYC/AML
Accredited investor verification for restricted offerings
Geographic restrictions for regulatory jurisdictions
Identity-based recovery for lost keys
Privacy-preserving compliance through selective revelation
Fraud prevention through identity linkage
Specification
Identity-Bound Token Types
We define three levels of identity requirements for tokens:
Open Tokens: No identity requirements (backward compatible with BRC-92/BRC-107)
Verified Tokens: Require valid BRC-52 certificate
Restricted Tokens: Require specific certificate fields or types
Enhanced Genesis Output
The genesis transaction establishes identity requirements:
Where:
issuerCertificateHash: SHA-256 hash of issuer's BRC-52 certificatecomplianceRules: Encoded rules for token transfersidentityCommitment:H(assetId || issuerCertificate || complianceRules || maxSupply)
Compliance Rules Structure
Identity-Linked Token Output
Where:
recipientCertificateHash: SHA-256 hash of recipient's BRC-52 certificateidentityCommitment:H(assetId || amount || certificateHash || prevTxid)
Identity-Aware Transfer Protocol
When transferring identity-linked tokens, the sender provides:
Verification Protocol
Recipients and overlays MUST verify:
1. Standard Token Checks (from BRC-106)
Commitment verification
Conservation check
Merkle proof validation
2. Identity Checks
Selective Field Revelation
Certificate holders reveal only required fields:
Determine Required Fields: Based on token's compliance rules
Encrypt for Recipient: Using BRC-52/53 key derivation
Include in Transfer: Add encrypted keys to certificate keyring
Recipient Decrypts: Using their identity key
Example revealing only country for geographic restriction:
Identity-Based Recovery
Tokens can include recovery conditions:
Where:
recoveryCommitment:H(certificateType || recoveryFields || recoveryPubkey)recoveryDelay: Time lock before recovery (e.g., 30 days)
Certificate Levels and Permissions
Use Cases
1. Security Token Offering (STO)
2. Geographic Restrictions
3. Age-Restricted Assets
4. Institutional Trading
Privacy Considerations
Zero-Knowledge Proofs
For sensitive compliance checks, support ZK proofs:
Prove age > 18 without revealing exact age
Prove accredited status without revealing net worth
Prove country membership without revealing specific country
Encrypted Field Storage
All certificate fields remain encrypted until revelation:
Only revealed fields are decrypted
Revelation is counterparty-specific
No permanent plaintext exposure
Pseudonymous Compliance
Users can maintain pseudonymity while proving compliance:
Certificate links to pubkey, not real name
Only certifier knows real identity
Selective revelation preserves privacy
Security Considerations
Certificate Validation
Always verify certificate signatures
Check revocation status via UTXO
Validate certifier is trusted
Ensure certificate hasn't expired
Replay Protection
Include prevTxid in commitments
Timestamp compliance attestations
Use nonces for uniqueness
Key Compromise
Certificate revocation via UTXO spending
Recovery mechanisms for token access
Time-locked recovery periods
Migration and Compatibility
Backward Compatibility
Open tokens work without identity
Existing BRC-92/106 tokens unaffected
Optional identity for gradual adoption
Migration Path
Phase 1: Deploy identity-aware wallets
Phase 2: Certifiers issue BRC-52 certificates
Phase 3: Token issuers adopt compliance rules
Phase 4: Overlays enforce identity requirements
Phase 5: Full ecosystem adoption
Implementation Examples
Creating Identity-Linked Token
Transferring with Compliance
Test Vectors
Identity Commitment
Compliance Check
References
BRC-52: Identity Certificates
BRC-53: Certificate Creation and Revelation
BRC-92: Mandala Token Protocol
BRC-107: Enhanced Mandala Token Protocol
BRC-43: Security Levels, Protocol IDs, Key IDs and Counterparties
BRC-2: Data Encryption and Decryption
BRC-3: Digital Signature Creation and Verification
Implementations
Reference implementations:
TypeScript: Coming Soon
Go: Coming Soon
Python: Coming Soon
Last updated
Was this helpful?

