← Back

Enotrium

Untraceable Control Systems

Farmers deserve privacy and end-to-end control over supply chains and digital marketplaces while still being subject to the truth. To maintain data privacy and autonomy, Enotrium employs zero-knowledge proofs (ZKPs), which allow landowners to verify affirmative statements on land quality without outsourcing sensitive data.

zk-STARKs

Enotrium uses a post-quantum secure cryptographic proof method called zk-STARKs (Zero-Knowledge Scalable Transparent Arguments of Knowledge). This method encodes transaction information into polynomial equations used to verify the authenticity of transactions.

How It Works

Proofs of authenticity take place between a prover and a verifier. The prover presents a polynomial P(x) of degree < d, with a corresponding constraint equation C(x). For the polynomial to be valid, its constraint equation must evaluate to zero at all points in the trace domain H.

For field F, HF, let:

$$Z_H(x) = \prod_{a \in H}(x - a)$$

Thus, C(x) is valid if and only if it is a multiple of ZH(x) which vanishes on H:

$$\forall a \in H : C(a) = 0 \Longleftrightarrow \exists Q(x) : C(x) = Q(x) \cdot Z_H(x), \\ \deg(Q) = \deg(C) - |H|$$

The prover commits masked versions of C(x) and Q(x), and the verifier samples random points over the extended trace domain. If the polynomials satisfy the constraints at these points, the statement evaluates as true with very high confidence.

If the polynomial is invalid, it is overwhelmingly unlikely that constraints will be satisfied on even one random point — that likelihood decreases exponentially with every random sample.

Let f, g be polynomials over the finite field F, with deg(f), deg(g) < d and fg. Let h = fg. Then the roots of h are the points where f = g. Note that h has at most d − 1 roots. So, for any finite set SF, the number of values aS for which f(a) = g(a) is at most d − 1.

Therefore, for a random aS:

$$\Pr[f(a) = g(a)] \leq \frac{d - 1}{|S|}$$

After k random samples:

$$\Pr[f(a) = g(a)] \leq \left(\frac{d - 1}{|S|}\right)^k$$

As long as the domain is large and the degree is kept small, the chance of successfully cheating becomes vanishingly small after only a few random samples. The security parameter c defines how large the evaluation domain will be:

$$|S| = cd, \text{ where } d = \deg(f)$$ $$\Pr[f(a) = g(a)] = \frac{d - 1}{|S|} = \frac{d - 1}{cd} = \frac{1}{c} - \frac{d-1}{|S|} \leq \frac{1}{c}$$ $$\text{E.g. Let } c = 100. \text{ Then } \Pr[f(a) = g(a)] \leq \left(\frac{1}{100}\right)^k \text{ for } k \text{ attempts.}$$

Using a high security parameter (≥100) guarantees soundness and efficiency; only a few samples from the verifier make it overwhelmingly likely that a cheater will fail the test.

Masking

C(x) and Q(x) are masked before commitment because committing original polynomials would allow the verifier to reconstruct transaction details. A random polynomial R(x) is added to C(x) and Q(x) at each step such that the constraints are still satisfied:

$$\text{Let } C'(x) = C(x) + R_C(x), \quad Q'(x) = Q(x) + R_Q(x)$$ $$\text{with } C'(x) = Z_H(x) \cdot Q'(x)$$

Transaction details remain obscure while constraints are still satisfied — the claim is verified without revealing private information.

Privacy-Preserving Blueprints

To address the potential limitations of pure intractability — such as hindering legitimate tracing of bad actors in supply chains — we extend this framework with privacy-preserving blueprints, a modular cryptographic tool originally proposed by Input Output Global.

Food systems often rely on outdated institutions that either lack credentialing or use anonymous website credentials. New protocols enable untraceability to protect farmers but complicate legitimate oversight: detecting unauthorized seed imports, preventing agroterrorism.

The same intractability is true for contaminators — toxifying supply chains, weed cartels, or bad farmers does not warrant privacy protections. Therefore, we implement an f-blueprint system.

The f-Blueprint System

Enotrium creates a new framework through functional encoding of the platform. A secure f-blueprint system allows an auditor (e.g., a DAO governance node or decentralized EPA equivalent) to publish an encoding of a function f(x, ·) for a secret input x — such as a watchlist of banned pesticides.

This enhances the balance between user anonymity, verifiable transparency, and regulatory oversight — particularly for supply chain integrity, land ownership proofs, or detecting illicit activities.

Integration with zk-STARKs

The f-blueprint system directly enhances ZKPs by allowing a third-party verifier, DAO governance node, or regulatory body to publish encoded functions for secret inputs. Users generate escrow Z from their credential attributes, verifiable by anyone, while only the auditor recovers specific outputs if needed.

The function f(x, ·) with secret input x can be encoded as part of the constraint equation C(x). The auditor publishes a public function f(x, ·) and an encrypted version of a private watchlist x called pkA. The user produces an escrow Z using f, pkA, and the user's private information y.

If the user is on the private watchlist x, this will be revealed in the escrow. The computational steps producing Z from f(pkA,y) are encoded in a zk-STARK using low-degree polynomials. Any third-party verifier can demonstrate that Z was produced honestly. The auditor can decrypt Z to attain the public function f and private list x, but not the user's private information y.

This maintains compatibility with FHE/NIZK constructions while adding quantum resistance via STARK's hash-based transparency.

VKey Credentials

Two types of logins are used on Enotrium:

For farmers and industrialists, Enotrium employs VKey credentials. A digital signature scheme verifies a digital signature on a public key, ensuring truth, ownership, and non-repudiation.

isSigned : VKey → Ser → Sig → Type

Cryptographic Primitives

Enotrium uses Ed25519 for AI model access and user interactions to ensure decentralization while creating public supply chain transparency. Fast signature verification is optimal for large data sets and performance-critical systems.

Ed25519 is the cryptographic primitive used by Cardano and Ripple. We encode privacy-preserving blueprints, a modular extension inspired by Input Output Global's work (2024), to enhance VKey/Ed25519 and zk-STARK frameworks for selective auditor oversight without compromising user privacy.

This specification creates a secure system for interfacing with rural supply chains securely and anonymously, while still ensuring identity verification to prevent use from bad actors.