Introduction
Abstract
Why Privacy Is a Myth in Always-Online Systems
Design Philosophy and Core Principles
System Overview and Architecture
Core Objects and Cryptographic Primitives
Offline Value Model
Offline Transaction Execution Protocol
Encrypted Settlement Constraints
Security Properties and Guarantees
Threat Model and Adversarial Analysis
Relationship to Zero-Knowledge Systems
Conclusion
Last updated 1 day ago