Search papers, labs, and topics across Lattice.
The paper introduces Condition-Triggered Dormant Authorization Paths (CT-DAP), a novel cryptographic asset control method that uses destructible authorization factors and a root-derivable framework to enable conditional delegation and regulatory supervision without persistent key exposure. CT-DAP employs dormant authorization paths composed of user-held credentials and administrative factors held by custodians, which are activated only upon verification of predefined conditions. The authors formalize the security of CT-DAP and prove its resistance to unauthorized control, path isolation, and stateless revocation under standard cryptographic assumptions, demonstrating sub-second activation latency in an instantiation using the Atomic Cryptographic Entity Generative Framework (ACE-GF).
Finally, cryptographic asset control that enables regulatory supervision and conditional delegation without persistent key exposure is here.
Control of encrypted digital assets is traditionally equated with permanent possession of private keys, a model that precludes regulatory supervision, conditional delegation, and legally compliant transfer at the cryptographic layer. Existing remedies (multi-signature schemes, threshold signatures, smart contracts, custodial delegation) require persistent key exposure, on-chain state mutation, or trusted intermediaries. We introduce Condition-Triggered Dormant Authorization Paths (CT-DAP), a cryptographic asset control method built on destructible authorization factors and parameterized by a root-derivable framework satisfying deterministic key derivation, context-isolated capability generation, and authorization-bound revocation. Under CT-DAP, control rights are dormant authorization paths composed of user-held credentials and administrative factors held by independent custodians; a path remains cryptographically inactive until all factors are simultaneously available. Upon verification of predefined conditions (e.g., user consent, inheritance events, time-based triggers), the corresponding factor is released, activating the path. Revocation is achieved by destroying factors, rendering the path permanently unusable without altering the cryptographic root. We formalize the threat model, define security games for unauthorized control resistance, path isolation, and stateless revocation, and prove security under standard assumptions (AEAD security of AES-GCM-SIV, PRF security of HKDF, memory-hardness of Argon2id, collision resistance of SHA-256). We instantiate CT-DAP using the Atomic Cryptographic Entity Generative Framework (ACE-GF) and evaluate performance, demonstrating sub-second activation latency with configurable security-performance trade-offs.