Elabify · Permissioned Privacy Enhancing Technology
Permissioned Privacy · Institutional Grade

Confidential settlements with auditable oversight

Post‑quantum identity, zero‑knowledge compliance proofs, and lawful access design — a privacy layer built for regulated digital asset markets.

System Architecture
Permissioned Privacy Enhancing Technology (PPET)
1. Identity Layer
Post‑quantum DIDs (ML‑DSA) + verifiable credentials (KYC, jurisdiction, sanctions status). Credentials are issued by trusted authorities and stored off‑chain with cryptographic proofs.
2. Compliance Proofs
Zero‑knowledge (zk‑STARK) proofs allow a party to prove regulatory status (e.g. non‑sanctioned, accredited) without revealing any underlying identity data.
3. Settlement
Privacy pools (EVM) and permissioned CoinJoin (Bitcoin) hide amounts and counterparties. Only authorised participants with valid credentials may join.
4. Auditable Access
Threshold notary decryption — any lawful access request requires multi‑party approval and is recorded on an immutable public audit log.
4
Architecture Layers
3
Chain Integrations
zk-STARK
Proof System
ML‑DSA
Post‑Quantum Identity
Capability families

Regulatory‑first privacy: selective disclosure, never blind anonymity

PPET is built around three logical families that map directly to institutional risk policies and compliance workflows.

A
Identity & Credentials
Who is transacting? Verified but private.
Primary
ML‑DSA keysRevocation registryZK KYC proofs
B
Confidential Settlement
Hide amounts, prove compliance.
Core
Stealth addressesPrivacy poolsPerm. CoinJoin
C
Auditable Oversight
Legal access with transparency.
Mandatory
Threshold notaryPublic audit logEscrow
Integrated networks

PPET operates across EVM privacy pools, Bitcoin CoinJoin, and future L2s with uniform permissioning and compliance proofs.

ETH
Ethereum privacy pools
Association sets + ZK credentials
Layer 1
BTC
Bitcoin CoinJoin (permissioned)
Whitelist anonymity sets
Taproot
L2+
Besu / Arbitrum / Base
Confidential transaction layer
Private, L2 and beyond
Use cases

Privacy that works with regulation, not against it

From cross‑border stablecoin settlements to confidential treasury rebalancing — PPET provides selective disclosure for auditors and zero‑knowledge for counterparties.

01
Cross‑border stablecoin flows
Move USDC / EURS between institutions without exposing balances or counterparty identity — prove sanctions compliance via ZK.
DIDZK proofaudit
02
Institutional treasury obfuscation
Hide treasury reserve movements on public ledgers while maintaining regulatory oversight and proof of asset backing.
credentialspools
03
Tokenised RWA confidentiality
Private ownership of tokenised T‑bills or credit funds — only issuer and authorised regulators see holdings.
PQnotary
04
Lawful access gateways
Threshold decryption with judicial approval — fully auditable on‑chain access logs that satisfy both GDPR and MiCA.
accesstrail
05
DeFi compliance wrapper
Wrap existing lending/AMM positions with ZK credential layer — prove regulatory status without deanonymising.
ZK proofsVC
06
Risk & compliance dashboard
Real‑time monitoring of privacy set size, notary activity, and regulatory access events — board‑ready reporting.
metricsaudit
Technical assurance & controls

Built for institutional risk committees

Every PPET deployment includes the following guarantees and mandatory gates. No opaque “readiness scores” — just clear requirements.

  • Post‑quantum identity – ML‑DSA keys managed in FIPS‑140‑3 HSMs
  • Verifiable credential revocation – real‑time status checks for KYC/AML
  • zk‑STARK proofs for compliance attributes (sanctions, jurisdiction, accredited investor)
  • Threshold notary decryption – no single point of access; on‑chain audit log
  • Permissioned anonymity sets – only verified entities participate in pools/CoinJoin
  • Circuit audits – all ZK circuits audited by Tier‑1 firms
  • Public access transparency – every lawful access request is logged immutably

⛔ Mandatory gates (auto‑disqualifiers)

Any PPET implementation that lacks threshold notary decryption, on‑chain audit logs, or post‑quantum upgrade path is rejected for institutional use. Anonymous‑only privacy pools without verifiable credentials are not permitted.

✅ Compliance ready

Designed to meet MiCA, GDPR, and FATF travel rule requirements. Selective disclosure ensures you never over‑share while proving all necessary regulatory attributes.

Adopt PPET

Institutional privacy that earns trust — not evades it

Integrate permissioned privacy into your digital asset stack. Request a design review or confidentiality assessment for your use case.

Permissioned Privacy Enhancing Technology v1.2 · Elabify Digital Assets · Updated March 2026