# Sending tokens by identifier

## Original Problem

A user, Alice, wishes to send a token to Bob who might not have a crypto (Ethereum) address. Alice, however, knows an identifier of Bob that can be attested. e.g. Bob's email address or Bob's mobile phone number.

This approach is made by Alice sending a virtual and anonymous attestation, attesting to Bob's right to redeem that token from Alice through a smart contract.

## Cheque

We call this kind of attestation *cheque* as it is actionable with a smart contract, comparable to a traditional cheque being redeemable with a bank.

Such a *cheque* would identify Bob by an identifier and is only actionable if Bob possesses an *identifier attestation* that binds his crypto (Ethereum) address with that identifier.

## Identifier Attestation

The identifier - email address or mobile numberâ€ - can't be learned from an observer with access to the Ethereum blockchain. However, it will be possible for Alice to see that Bob redeeming cheques from other parties in the future, if he redeemed the cheque he received from Alice.

We wish to ensure that only Bob (the attested owner of the identifier *and* the person holding a copy of the cheque) can redeem the cheque. Neither a malicious attestor (or someone controlling Bob's identifier) nor a man-in-the-middle who might extract the cheque, will be able to redeem the cheque alone.

Furthermore, we want to allow Bob to be able to reuse his attestation once it is made. So that after redeeming a cheque from Alice, he can also receive a cheque from Carol and redeem it using his attestation without the need for Alice or Carol to communicate.

The protocol is secure under any composition of senders (Alices) and receivers (Bobs) based on a one-more discrete logarithm-like assumption.

# Protocol

We assume that both Alice and Bob know Bob's identifier

*i*.We use multiplicative group notation. Thus

*G*denotes the generator element,^{x}*G*, taken*x*times as apposed to*GÂ·x*in some other works (when using additive group notation as normally done over elliptic curves).

## Identifier Attestation

This only needs to be done once for Bob. It can be done either before or after receiving the first cheque.

Bob generates an Ethereum key (if he hasn't already).

Bob generates a privacy key

*p*.Bob computes a hiding to his privacy key;

*s=V*, where^{p}*V*is a generator for a large prime-order subgroup.He then constructs a zero-knowledge proof that he knows the exponent

*p*: He picks a random*r*and computes*t=V*,^{r}*c=H(V, s, t)*and*d=r+cÂ·p*. The proof is a function of*(V, s, t, d)*.Bob signs a CSR (signing request) which includes the proof and his identifier

*i*using his Ethereum key.An attestor verifies that Bob owns the identifier, that the signature is valid and that the proof is valid by computing

*c=H(V, s, t)*and verifying that*V*.^{d}=tÂ·s^{c}If all the checks pass then the issuer constructs a Pedersen commitment;

*v=G*where^{H(i)}Â·s*G*is a generator for a large prime-order subgroup.Finally the attestor issues an attestation that binds Bob's Ethereum address to the commitment

*v*as its subject.

## Cheque

Alice wishes to send Bob a certain amount of a token and knows Bob's identifier

*i*. She creates a one-time-key*q*, and computes a Pedersen commitment*u=G*.^{H(i)}Â·V^{q}Alice writes a cheque for anyone to redeem that amount of the token from her smart contract (valid for a certain amount time period). The cheque requires a valid attestation to a commitment

*v*and a zero-knowledge proof of knowledge of*x*s.t.*v/u=V*.^{x}Alice sends

*q*and the cheque to Bob.

## Redeem the Cheque with the Attestation

Bob computes a value *x=p-q* and, in a redeeming transaction, constructs a Fiat-Shamir based Schnorr proof-of-knowledge that it knows *x* s.t. *v/u=V ^{x}*. That is, Bob proceeds as follows:

Pick random

*r*and compute*t=V*^{r}Next compute

*c=H(G, V, v, u, t)*Finally compute

*d=r+cÂ·x*Bob then signs

*(G, V, v, u, t, d)*and the attestation (whose subject is*v*) and sends all these values and the signature to the smart contract.

The smart contract computes:

That the amount in the attestation is less than Alice's balance.

The attestation is a valid attestation that binds

*v*to Bob (transaction sender)'s Ethereum address.That the signatures is correct.

*c=H(G, V, v, u, t)*and verifies that*V*^{d}=tÂ·(v/u)^{c}That the cheque is still valid.

If all predicates are satisfied, emits the pay to Bob.

# Generalisation of the protocol

The cheque in this case can be a generic attestation. This protocol has two attestations:

cheque, which is a kind of attestation to trigger an action.

identifier attestation, issued by an identifier attestor, which enables the beneficiary of the cheque to perform an action (redeem).

The first attestation here does not have to be a cheque. Instead, it can be a normal attestation. Such generalisation was used in, for example, ticketing, where the first attestation attests to the rights of entering the venue corresponding to the ticket.

In such case where both are attestations, the "subject" of the 1st attestation, for example, `numero=1280`

, indicating the ticket ID 1280, can be used as an identifier attestation for another 3rd party attestation, which attests something to the ticket (although the hiding might not be necessary in such a use case). Here two examples are provided:

A speaker of the conference can invite a ticket holder to a closed-door meeting. Such an invitation is an attestation on the ticket ID. Such an invitation is, again, used as a ticket.

COâ‚‚ coin is an issuer of carbon credits for someone who paid to offset their carbon footprint. They can issue an attestation on the ticket ID, attesting to the fact that the ticket's carbon footprint has offset. Such attestation enables access to privileged online service or discounts.

# Implementation Issues

## Implementations based on elliptic curves

We note that despite having described the protocol using general multiplication group notation, the implementations will be based on elliptic curves. Therefore, *G, V, u, v* will be points on an elliptic curve where *u* and *v* are computed using generator points *G* and *V*. Furthermore, this also means that the computation in step 4 for Bob and step 4 for the smart contract will happen over the integers, modulo the curve order.
We note that it is crucial that the generators *G* and *V* are constructed such that they work over the same (large) subgroup. I.e. that *Vâˆˆ <G>* and that **no-one** knows the discrete log of *V* to base *G* (and vice versa). Otherwise breaks become trivial.
Furthermore it is also crucial that the curve has co-factor 1, or if not, that the point *G* generates a subgroup of large prime order.

This post mentions some standards for EC-based Fiat-Shamir Schnorr proofs and thus where to look for further details.

## In the case of using a JavaScript deployed as a service

Furthermore, we note that there does not seem to be standard Javascript libraries to compute such an elliptic curve Fiat-Shamir Schnorr proof. Thus this could be allowed to be supported by a third party (specifically step 1-3 for Bob). However, if such a library is malicious, it will learn *x* and thus be able send this value back to its author, who will in turn be able to impersonate Bob. This *must* not happen. Thus instead of constructing a proof of knowledge of *x* Bob uses such a library to construct a proof of knowledge of *x+w* for a random *w*. Based on this Bob will instead send *(V, s, t, d, w)* in step 3 and the server will instead verify *V ^{d}=tÂ·s^{cÂ·w}*.
(A similar trick must be done for the proof used to redeem the cheque using the smart contract.)
Still, even this approach does allow for a front-running displacement attack in case the Javascript library sends the query to its owners who also do mining, and so the miner will learn

*x*and thus be able to impersonate Bob once he tried to redeem the cheque.

However, it might still be possible to easily implement this in Javascript, as SubtleCrypto.deriveKey supports the construction of an ECDH key which can be used to construct the value *r* and *t* in step 1 for Bob over an elliptic curve. Since hashing is also readily supported, step 2 can also easily be implemented. Furthermore, Javascript also supports big integer arithmetic through BigInt, which is needed to compute step 3. Thus the only real issue that might not be trivial is to extract the BigInt representation of *r* along with the curve order.