Transaction Lifecycle

A transaction routed through INVSBL moves from initiation to on-chain settlement without exposing sender, receiver, or transaction context, while remaining valid and final on the underlying blockchain.


1. Transaction Flow Diagram

1. Enter Privacy Layer

2. Generate Ephemeral Address

3. Seal Transfer

4. Distribute Privately

5. Anonymous Claim

6. Exit to Blockchain

2. Entering the Private Layer

A private transaction begins when assets are routed through INVSBL and validated without exposing transaction details.

2.1 What Happens

Action
Result

Cryptographic ownership

Ownership of the assets is enforced cryptographically

Reference removal

Public references to the sender's wallet are removed

Transaction isolation

Transaction is no longer linkable to prior on-chain activity

2.2 Key Transition

From this point forward, all execution occurs without exposing transaction metadata to the public ledger.

2.3 Visibility Change


3. Ephemeral Address Generation

For each private transaction, INVSBL generates a one-time ephemeral keypair. This keypair exists only for the duration of the transaction and is never reused.

3.1 Design Guarantees

Property
Implementation

No address reuse

Each transaction uses a unique, one-time address

No persistent identifiers

No identifiers are tied to users across transactions

No transaction continuity

No connections between transactions that could form a graph

Repeated usage of the protocol does not create patterns that can be analyzed or clustered.

3.2 Address Lifecycle


4. Transfer Sealing

Once the details are set, the transfer is packaged into a payment artifact used to authorize and complete the transaction.

4.1 What's Included

The sealed artifact includes:

Component
Purpose

Cryptographic proof

Proof of authorization to spend

Claim conditions

Explicit conditions for the recipient to claim funds

4.2 What's NOT Included

The artifact does NOT include:

  • Wallet addresses

  • Identifiers

  • Linkable metadata

  • Transaction history

  • Balance information

4.3 Security Property

The sealed transfer can be safely shared without compromising privacy.


5. Private Distribution

The encrypted payment artifact can be distributed through any communication channel.

5.1 Supported Channels

Channel Type
Examples

Messaging platforms

Telegram, Signal, WhatsApp, Discord

APIs

Programmatic distribution via REST/GraphQL

Automated systems

Batch payments, recurring transfers, application integrations

Any method

Email, QR codes, links, etc.

5.2 Channel Independence

The way a payment is shared does not change its privacy.

5.3 Security Guarantee

Even if the artifact is:

  • Intercepted

  • Publicly shared

  • Analyzed

It cannot be used to infer:

  • Identities

  • Balances

  • Transaction relationships

  • Historical activity


6. Anonymous Claim

The recipient completes the transaction by claiming the funds using the sealed artifact.

6.1 Claim Properties

At claim time:

Property
Protection

Wallet identity

The recipient does not reveal their wallet identity

Sender-receiver link

No cryptographic link is created between sender and receiver

Transaction correlation

The claim cannot be correlated with other transactions

6.2 Privacy Preservation

The claim process preserves anonymity on both sides of the transaction.

6.3 What's Protected


7. Exit Without Trace

After a successful claim, assets exit the privacy layer and settle on the base blockchain.

7.1 What Happens at Exit

Stage
Result

Asset reappearance

Assets are received as standard SPL tokens on Solana or standard ERC-20 tokens on EVM networks.

No linkage

No cryptographic linkage exists between the exit and the original sender

No trail

No historical trail can be reconstructed

7.2 Blockchain Perspective

From the perspective of the blockchain:

  • ✓ Transaction is valid

  • ✓ Transaction is final

  • ✗ Origin is undiscoverable

  • ✗ Path is unknowable

7.3 Complete Privacy

The transaction's origin and path remain permanently undiscoverable.


8. Complete Lifecycle Summary

Stage
What Happens
Privacy Status

1. Enter

Assets move into privacy layer

Sender history severed

2. Generate

Ephemeral address created

No persistent identifier

3. Seal

Transaction encrypted in artifact

Safe to share publicly

4. Distribute

Artifact shared via any channel

Channel doesn't matter

5. Claim

Recipient claims funds anonymously

Both parties protected

6. Exit

Assets settle on blockchain

No trace to origin

8.1 Consistent Execution

Property
Status at Every Stage

Sender anonymity

✓ Protected throughout

Receiver anonymity

✓ Protected throughout

Amount confidentiality

✓ Protected throughout

Relationship privacy

✓ Protected throughout

Historical isolation

✓ Protected throughout

8.2 What Never Gets Exposed

Throughout the entire lifecycle, the following remain hidden:

  • Sender identity

  • Receiver identity

  • Transaction amount

  • Transaction relationships

  • Historical context

  • Future connections

8.3 What Always Gets Preserved

Throughout the entire lifecycle, the following are guaranteed:

  • Transaction correctness

  • Asset security

  • Settlement finality

  • Network consensus

  • Blockchain validity


9. Timeline Example

Total elapsed time: < 1 minute

Privacy: Complete and permanent

Last updated