Introducing ZIP-SRA-KEYGEN: How a Registry Authority Is Born
Why continuity of signing authority matters more than any individual signer, and how FROST threshold signing creates a durable cryptographic identity.
Blog
Nine thesis-derived posts focused on structural explanation, system design, and adoption constraints.
Why continuity of signing authority matters more than any individual signer, and how FROST threshold signing creates a durable cryptographic identity.
Six event types, Lamport clocks, hash chains, and a non-binary evidentiary taxonomy for real-world asset registries.
Disclosure packages, verifier roles, dossier tiers, and how verification labor compounds across the art market.
An explanation-first account of why decay does not need a special cause once coordination architecture is absent.
How rising verification burden becomes the hidden mechanism converting uncertainty into lasting discounting.
Why episodic visibility campaigns fail and why persistence requires impersonal process architecture.
What the ERL case reveals when tested as a worst-case entropic configuration instead of a biography.
Why shielded Layer 1 design is framed as infrastructure for stewardship continuity rather than financial speculation.
How integrity and adoption layers split responsibility across micro, meso, and macro coordination levels.