Proof-Carrying
Authorization
Privately authorize actions without revealing identity. A cryptographic model for composable, replay-resistant access control.
Identity is Authorization's Bottleneck
Traditional systems ask "Who are you?" to grant access. This creates central honeypots of identity and forces privacy trade-offs. Proof-Carrying Authorization (PCA) flips the model: verifiers check a Zero-Knowledge proof that a policy is satisfied, without ever learning which user satisfied it.
Core Primitives
Zero-Knowledge
Authorize transparent actions (payments, allowlist gates) while keeping the authorizer's identity completely private using zk-SNARKs.
Domain Binding
Proofs are cryptographically bound to a specific Protocol, Policy, and Context. They cannot be replayed or redirected.
Replay Resistance
Deterministic nullifiers ensure every authorization is unique, preventing double-spending without revealing the spender.
Solana Native
Designed for constrained environments. Uses Groth16 and Pinocchio for efficient on-chain verification.
The Protocol
PCA binds the proof to the action scope to ensure integrity.