Transaction Lifecycle
A transaction routed through INVSBL moves from initiation to on-chain settlement without exposing sender, receiver, or transaction context, while remaining valid and final on the underlying blockchain.
1. Transaction Flow Diagram
1. Enter Privacy Layer
↓
2. Generate Ephemeral Address
↓
3. Seal Transfer
↓
4. Distribute Privately
↓
5. Anonymous Claim
↓
6. Exit to Blockchain2. Entering the Private Layer
A private transaction begins when assets are routed through INVSBL and validated without exposing transaction details.
2.1 What Happens
Cryptographic ownership
Ownership of the assets is enforced cryptographically
Reference removal
Public references to the sender's wallet are removed
Transaction isolation
Transaction is no longer linkable to prior on-chain activity
2.2 Key Transition
From this point forward, all execution occurs without exposing transaction metadata to the public ledger.
2.3 Visibility Change
3. Ephemeral Address Generation
For each private transaction, INVSBL generates a one-time ephemeral keypair. This keypair exists only for the duration of the transaction and is never reused.
3.1 Design Guarantees
No address reuse
Each transaction uses a unique, one-time address
No persistent identifiers
No identifiers are tied to users across transactions
No transaction continuity
No connections between transactions that could form a graph
Repeated usage of the protocol does not create patterns that can be analyzed or clustered.
3.2 Address Lifecycle
4. Transfer Sealing
Once the details are set, the transfer is packaged into a payment artifact used to authorize and complete the transaction.
4.1 What's Included
The sealed artifact includes:
Cryptographic proof
Proof of authorization to spend
Claim conditions
Explicit conditions for the recipient to claim funds
4.2 What's NOT Included
The artifact does NOT include:
Wallet addresses
Identifiers
Linkable metadata
Transaction history
Balance information
4.3 Security Property
The sealed transfer can be safely shared without compromising privacy.
5. Private Distribution
The encrypted payment artifact can be distributed through any communication channel.
5.1 Supported Channels
Messaging platforms
Telegram, Signal, WhatsApp, Discord
APIs
Programmatic distribution via REST/GraphQL
Automated systems
Batch payments, recurring transfers, application integrations
Any method
Email, QR codes, links, etc.
5.2 Channel Independence
The way a payment is shared does not change its privacy.
5.3 Security Guarantee
Even if the artifact is:
Intercepted
Publicly shared
Analyzed
It cannot be used to infer:
Identities
Balances
Transaction relationships
Historical activity
6. Anonymous Claim
The recipient completes the transaction by claiming the funds using the sealed artifact.
6.1 Claim Properties
At claim time:
Wallet identity
The recipient does not reveal their wallet identity
Sender-receiver link
No cryptographic link is created between sender and receiver
Transaction correlation
The claim cannot be correlated with other transactions
6.2 Privacy Preservation
The claim process preserves anonymity on both sides of the transaction.
6.3 What's Protected
7. Exit Without Trace
After a successful claim, assets exit the privacy layer and settle on the base blockchain.
7.1 What Happens at Exit
Asset reappearance
Assets are received as standard SPL tokens on Solana or standard ERC-20 tokens on EVM networks.
No linkage
No cryptographic linkage exists between the exit and the original sender
No trail
No historical trail can be reconstructed
7.2 Blockchain Perspective
From the perspective of the blockchain:
✓ Transaction is valid
✓ Transaction is final
✗ Origin is undiscoverable
✗ Path is unknowable
7.3 Complete Privacy
The transaction's origin and path remain permanently undiscoverable.
8. Complete Lifecycle Summary
1. Enter
Assets move into privacy layer
Sender history severed
2. Generate
Ephemeral address created
No persistent identifier
3. Seal
Transaction encrypted in artifact
Safe to share publicly
4. Distribute
Artifact shared via any channel
Channel doesn't matter
5. Claim
Recipient claims funds anonymously
Both parties protected
6. Exit
Assets settle on blockchain
No trace to origin
8.1 Consistent Execution
Sender anonymity
✓ Protected throughout
Receiver anonymity
✓ Protected throughout
Amount confidentiality
✓ Protected throughout
Relationship privacy
✓ Protected throughout
Historical isolation
✓ Protected throughout
8.2 What Never Gets Exposed
Throughout the entire lifecycle, the following remain hidden:
Sender identity
Receiver identity
Transaction amount
Transaction relationships
Historical context
Future connections
8.3 What Always Gets Preserved
Throughout the entire lifecycle, the following are guaranteed:
Transaction correctness
Asset security
Settlement finality
Network consensus
Blockchain validity
9. Timeline Example
Total elapsed time: < 1 minute
Privacy: Complete and permanent
Last updated