Skip to main content

Bearer Formats

Specter's data protocol is designed around bearer instruments — objects where possession equals access. The cryptographic secrets needed to generate a ZK proof and access committed data are encoded directly into a physical or digital artifact. There is no account to log into, no server to authenticate against, no custodian to trust. You hold the object; you control the data.

The protocol supports four bearer formats, each optimized for a different use case and threat model.

Overview

FormatData CapacityKey TypePersistenceBest For
Numeric KeySeed (128 bits) + metadataPhantom Key (one-time)Paper, memory, voiceSimple transfers, gift cards, offline sharing
PNG Bearer ObjectFull keypair + all secretsPhantom Identity (persistent)Digital filePersistent accounts, recurring access
PDF VoucherMetadata + QR + numeric fallbackPhantom Key (one-time)Printable documentBranded vouchers, formal issuance
NFC TagEncrypted seed + metadataPhantom Key (one-time)Physical tagGift cards, access cards, event tickets

Numeric Keys

Numeric Keys are the simplest bearer format: a human-readable string of digits that encodes a 128-bit seed and associated metadata. They are the primary format for Phantom Keys.

Format

9473 0018 7376 9372 0484 1273

Displayed in groups of four digits for readability. The full encoding contains:

FieldDescriptionSize
Version byteFormat version (V1-V7)1 digit
SeedRoot entropy (128 bits)~39 digits
AmountScientific notation (significand + exponent)Variable
Leaf indexVariable-length encoding of tree positionVariable
ChecksumError detection (CRC-based)4 digits

Total length: 24-30 digits depending on version and amount encoding.

Seed-Based Derivation

All cryptographic secrets are deterministically derived from the 128-bit seed using HKDF-SHA256:

SecretHKDF Info StringPurpose
secretghostcoin-secret-v1Primary commitment preimage input
nullifierSecretghostcoin-nullifier-v1Nullifier / accessTag derivation
blindingghostcoin-blinding-v1Commitment randomization
changeBlindingghostcoin-change-blinding-v1Partial withdrawal change commitment
quantumSecretghostcoin-quantum-v1Post-quantum commitment (V4+)

Each HKDF output is 32 bytes, reduced modulo the BN254 scalar field prime to produce a valid field element. The seed is the single source of entropy — everything else is derived.

Properties

PropertyValue
Human-readableGroups of four digits. Can be spoken aloud, read over the phone, or dictated.
Paper-friendlyShort enough to write on a card, receipt, or sticky note.
Error detection4-digit checksum catches transcription errors.
Self-containedThe number encodes everything needed to reveal the commitment (plus chain access for the Merkle proof).
No encryptionThe numbers are the secret. Anyone who reads them controls the commitment.

When to Use

Numeric Keys are ideal for one-time transfers where simplicity and universality matter more than multi-factor security. Gift cards, printed vouchers, verbal sharing, low-tech environments.

PNG Bearer Objects

PNG Bearer Objects are the format for Phantom Identity. They encode a full secp256k1 keypair, all commitment secrets, and the local half of the split key — all embedded in a standard PNG image file.

Structure

The PNG file uses the standard tEXt metadata chunk (defined in the PNG specification) to store identity data. The visual content of the image can be anything — a logo, an abstract pattern, a QR code — the cryptographic payload is in the metadata, not the pixels.

Metadata FieldDescriptionEncrypted?
publicKeysecp256k1 public key (hex)No
encKeyPartALocal half of split private keyYes (if passphrase set)
secretBN254 field elementYes (if passphrase set)
nullifierSecretBN254 field elementYes (if passphrase set)
blindingBN254 field elementYes (if passphrase set)
dataHashHash of associated dataYes (if passphrase set)
quantumSecret256-bit quantum commitment preimageYes (if passphrase set)
commitmentPoseidon commitment hashNo
quantumCommitmentkeccak256(quantumSecret)No
leafIndexPosition in the Merkle treeNo
saltPBKDF2 salt (if passphrase set)No
ivAES-GCM IV (if passphrase set)No
encryptedBoolean flagNo

Passphrase Encryption

When a passphrase is set, all sensitive fields are encrypted as a single AES-256-GCM payload:

Without the passphrase, the encrypted fields are indistinguishable from random data. The salt and IV are stored in the clear — they do not need to be secret.

Properties

PropertyValue
PersistentSupports unlimited connect/disconnect cycles via Access Proofs.
Self-sovereignNo server, no account, no recovery. The file is the identity.
Two-factor (optional)Possession (file) + knowledge (passphrase).
PortableStandard PNG file. Works on any device that can read files.
Backup-friendlyCopy the file to cold storage, USB drive, or print the QR code.

When to Use

PNG Bearer Objects are the format for persistent anonymous identities, recurring authentication, and any workflow that requires a signing key over multiple sessions.

PDF Vouchers

PDF Vouchers embed Phantom Key metadata in PDF document properties (setProperties), combined with a visual presentation that includes QR codes and a printed numeric key for offline recovery.

Structure

ComponentLocationPurpose
Metadata payloadPDF setProperties (document properties)Machine-readable key data
QR codeVisual page contentScan-to-redeem for mobile
Numeric keyPrinted text on pageHuman-readable fallback for offline recovery
BrandingVisual page contentIssuer logo, denomination, instructions

Dual Recovery Paths

PDF Vouchers provide two independent recovery paths:

  1. QR code: scan with a phone camera. The QR encodes the same data as the numeric key. Fastest path for mobile users.
  2. Numeric key: printed in plain text. The ultimate fallback — works even if the QR is damaged, the PDF is printed in low resolution, or the user has no camera.
  3. PDF metadata: programmatic extraction via setProperties. Used by automated systems that process vouchers in bulk.

Properties

PropertyValue
PrintableStandard PDF. Print on any printer.
BrandedIssuer can customize visual design, add logos, instructions.
RedundantThree independent recovery paths (QR, numeric, metadata).
Offline-capablePrinted voucher works without any device until the reveal step.
One-timeBacked by Phantom Keys (nullifier spent on reveal).

When to Use

PDF Vouchers are ideal for formal issuance: employee credentials, loyalty rewards, branded gift cards, event tickets, institutional certificate delivery. The printable format and branding support make them suitable for non-technical recipients.

NFC Tags

NFC Tags encode Phantom Key data on NTAG 424 DNA chips — tamper-evident, cryptographically authenticated physical bearer instruments.

Hardware: NTAG 424 DNA

The NTAG 424 DNA is an NFC chip manufactured by NXP Semiconductors with hardware-level security features:

FeatureDescription
SUN AuthenticationSecure Unique NFC. Each tap generates a unique, cryptographically signed response. Prevents cloning.
AES-128 encryptionOn-chip symmetric encryption. Data is encrypted at the hardware level.
Tamper detectionThe chip can detect physical tampering attempts.
Read countersHardware counter increments on each read. Detects unauthorized reads.
Multiple file areasSeparate storage regions with independent access controls.

Data Layout

RegionContentAccess Control
Public URLNDEF URL record pointing to the Specter redemption page. Includes SUN authentication parameters (PICC data + MAC).Read: open. Write: locked.
Encrypted payloadPhantom Key seed + metadata, AES-128 encrypted.Read: requires authentication. Write: locked after issuance.
SUN parametersEncrypted PICC data + CMAC. Verified server-side to confirm tag authenticity.Generated by hardware on each tap.

Tap-to-Redeem Flow

Anti-Cloning

The NTAG 424 DNA's SUN authentication makes cloning practically impossible:

  1. Each tap generates a fresh AES-CMAC using the chip's internal key (never exposed).
  2. The CMAC covers the chip's unique ID (UID) and the current read counter.
  3. The verification server holds the chip's AES key (provisioned during manufacturing/issuance).
  4. A cloned chip cannot produce valid CMACs because it does not have the internal key.
  5. A replayed CMAC will fail because the read counter has advanced.

Properties

PropertyValue
Physical bearerTangible object. Hand it to someone.
Tamper-evidentHardware detection of physical intrusion.
Clone-resistantSUN authentication prevents duplication.
Encrypted at restAES-128 on-chip encryption.
Tap-to-redeemSingle NFC tap initiates the reveal flow.
One-timeBacked by Phantom Keys (nullifier spent on reveal).

Use Cases

Use CaseDescription
Gift cardsPhysical cards with NFC chips. Tap to redeem GHOST tokens or access data.
Access cardsProve credential ownership by tapping an NFC-enabled reader.
Event ticketsTamper-proof, non-clonable tickets. SUN authentication prevents counterfeits.
Physical key distributionDistribute encryption keys or API credentials as NFC tags. One tap, one retrieval, key material deleted.
Supply chain verificationAttach NFC tags to physical goods. Each tap proves authenticity via on-chip cryptography.

Format Selection Guide

RequirementRecommended Format
Simplest possible sharingNumeric Key
Persistent identityPNG Bearer Object
Printable, branded voucherPDF Voucher
Physical tamper-proof cardNFC Tag
Verbal/phone sharingNumeric Key
Multi-factor securityPNG Bearer Object (with passphrase)
Automated batch processingPDF Voucher (metadata extraction)
Anti-counterfeitingNFC Tag (SUN authentication)
Air-gapped environmentNumeric Key or printed PDF
Mobile-first redemptionNFC Tag or PDF Voucher (QR scan)