Blog

RSA on Zcash: Integrity with Selective Disclosure

The registry problem in artist estates is not solved by storage alone. The thesis proposes RSA as an integrity protocol and argues for a shielded public Layer 1 because verification must remain durable without forcing exposure.

RSA Zcash Selective Disclosure

From archival storage to registrarial function

Many estate systems already store files: cloud drives, spreadsheets, private databases, catalog drafts, correspondence folders. Yet the same verification work keeps repeating. Why? Because storage does not guarantee independent verifiability under institutional turnover.

The thesis reframes this as structural registrarial failure: stewardship claims exist but do not persist as reusable coordination infrastructure. Each interface has to reconstruct confidence from scratch.

RSA is introduced to change that condition by preserving issuance and sequence integrity of provenance-relevant stewardship statements.

What RSA is and what it refuses to be

Scope discipline is central in Chapter 5. RSA is a narrow layer: append-only, work-level integrity logging for statements that affect attribution, authenticity, edition status, custodial status updates, and revision history. It records who issued what and when, in a tamper-evident order.

It explicitly is not a marketplace, not tokenization, not valuation, not ownership adjudication, and not a substitute for scholarship or curatorial judgment. Meaning and legitimacy remain social. RSA stabilizes continuity of claims, not final truth.

This boundary protects the design from overreach and category error.

Why normal databases are insufficient under entropy

Traditional databases can hold records and signatures. The issue is governance dependency. If one operator controls mutability, then confidence in records remains tied to continuity of that operator. Succession, dispute, or platform failure pushes trust back into question.

The thesis highlights this vulnerability through both institutional fragility and digital decay: websites vanish, credentials are lost, budgets change, and link rot degrades practical retrievability. Data once existed, but confidence in sequence and integrity no longer survives independently.

So the requirement is durable memory that persists beyond any single institution or administrator.

Two simultaneous constraints

Chapter 5.6 states two constraints that must be met together. First, tamper-evident ordering: prior stewardship statements cannot be silently altered or reordered. Second, selective disclosure: verification must be possible without forcing full transparency of sensitive identity and inventory information.

Most registry options satisfy one but fail the other. Opaque centralized systems preserve privacy but require blind trust in operators. Over-transparent systems increase legal, security, and market risk, discouraging participation.

RSA on a shielded public Layer 1 is proposed as the configuration that satisfies both constraints structurally.

Why shielded public Layer 1 matters

The argument is less about crypto ideology and more about institutional survivability. A public base layer reduces dependence on any private platform's continuity. Shielding capabilities support scoped proof rather than involuntary exposure.

In this framing, Zcash is treated as infrastructure, not as speculative endpoint. Its relevance comes from the ability to preserve verifiable sequence with privacy-compatible access patterns needed in art-market contexts.

The thesis language is precise: privacy is enforced by design, not by omission of records.

The lifecycle logic: where adoption enters

RSA's lifecycle runs from explicit authority declaration to canonical identifiers, from accumulated stewardship events to selective disclosure, through COA interface into trust compounding. This sequence matters because it ties technical integrity to real coordination checkpoints.

The COA step is especially pragmatic. Instead of asking markets to adopt new ritual objects, it uses a familiar instrument as onboarding interface. The thesis emphasizes that adoption risk is primarily institutional demand, not technical possibility.

If insurers, lenders, institutions, and high-integrity intermediaries reward better verification, participation becomes rational.

What RSA can and cannot guarantee

RSA can guarantee traceability of what is issued and in what order. It cannot guarantee that every statement is correct. It cannot compel completeness. It cannot settle disputes by protocol fiat. It makes omissions and revisions legible, which improves accountability conditions.

This constrained promise is a strength. Overpromising is one reason many "trust" systems fail when exposed to real governance conflict.

In the thesis model, correctness remains evidentiary and social; integrity remains infrastructural.

Why this is counter-entropic

A system is counter-entropic in this thesis if its outputs lower future coordination costs. RSA does that when each stewardship event becomes reusable verification substrate. Due diligence effort declines on the margin, rather than restarting from zero per interaction.

This is the operational claim behind "trust compounds instead of resetting." It is not metaphysical trust. It is reduced workload for credible verification under turnover and dispute.

Implementation discipline: keep layers separate

One recurring failure mode in registry projects is collapsing integrity, context, and legitimacy into a single technical claim. Chapter 5 avoids that by separating layers: integrity log, dossier/catalogue context, and field recognition. In practical terms, that means product decisions should avoid implying that protocol history alone resolves scholarly, curatorial, or legal disputes.

Layer separation also improves governance under revision. When new evidence appears, the system can preserve issuance chronology while supporting transparent amendments and contestable interpretation. That balance is a direct adoption enabler in environments where procedural traceability and corrigibility are as important as data availability.

Key takeaways

From the thesis