Cryptographic Architecture
Architecture
Technical Architecture
End-to-end protocol design — from purchase attestation through ZK proof generation to consensus finalization.
Reference
Cryptographic Taxonomy
Terminology and classification of every cryptographic primitive used in REF, with domain separation tags.
Reference
Cryptographic Stack
Layer-by-layer breakdown of the cryptographic stack — Poseidon, Groth16, Ed25519, BLS12-381, and SHA3-256.
Pipeline
Cryptographic Operations
The six-step pipeline showing where cryptographic operations happen and what data crosses each boundary.
Key Management
Key Architecture
Key types, lifecycle management, rotation policies, and trust boundaries for merchant, validator, and protocol keys.
Formal Verification
V&V Status
Verification & Validation
Phase 1 evidence bundle (5/5 locked), refinement chain, known gaps, and Phase 2 roadmap.
TLA+ Properties
TLA+ Properties & Principles
Four consensus invariants and seven token lifecycle invariants verified by TLC across 152.7M states.
TLA+ Spec Anatomy
TLA+ Constants, Variables & Actions
Complete structural anatomy of the REFConsensus v1.9 and TokenLifecycle specifications with interactive action cards.
Composition
Assume-Guarantee Composition
How the cryptographic, consensus, and economic layers compose through explicit contracts with documented degradation modes.
Security