Identity-Linked Token Protocol
Abstract
Motivation
Specification
Identity-Bound Token Types
Enhanced Genesis Output
Compliance Rules Structure
Identity-Linked Token Output
Identity-Aware Transfer Protocol
Verification Protocol
1. Standard Token Checks (from BRC-106)
2. Identity Checks
Selective Field Revelation
Identity-Based Recovery
Certificate Levels and Permissions
Use Cases
1. Security Token Offering (STO)
2. Geographic Restrictions
3. Age-Restricted Assets
4. Institutional Trading
Privacy Considerations
Zero-Knowledge Proofs
Encrypted Field Storage
Pseudonymous Compliance
Security Considerations
Certificate Validation
Replay Protection
Key Compromise
Migration and Compatibility
Backward Compatibility
Migration Path
Implementation Examples
Creating Identity-Linked Token
Transferring with Compliance
Test Vectors
Identity Commitment
Compliance Check
References
Implementations
Last updated
Was this helpful?

