Proposal: TokenProof — reusable on-ledger compliance primitive for CIP-0056 tokens (working PoC, CI green)#231
Conversation
Signed-off-by: Compliledger <[email protected]>
Added a comprehensive development fund proposal for TokenProof, detailing objectives, implementation mechanics, milestones, funding, and compliance mechanisms. Signed-off-by: Compliledger <[email protected]>
Update author information, creation date, and enhance the abstract and specification sections for clarity and detail. Improve compliance primitive description and funding request details. Signed-off-by: Compliledger <[email protected]>
Updated funding request details and budget breakdown in the proposal. Signed-off-by: Compliledger <[email protected]>
Updated the TokenProof proposal with author details, funding request, and compliance model explanation. Enhanced clarity on the project's objectives and deliverables. Signed-off-by: Compliledger <[email protected]>
Removed author details and status from the proposal. Signed-off-by: Compliledger <[email protected]>
Added detailed adoption signals and integration paths for TokenProof, including immediate targets for CIP-0056 token implementations, DvP settlement workflows, and stablecoin issuers. Expanded on developer adoption steps and ecosystem validation metrics. Signed-off-by: Compliledger <[email protected]>
Signed-off-by: Compliledger <[email protected]>
|
@Mharris40
|
|
Thanks Wayne. Quick update on both fronts:
We’re in active discussions with Hedera around piloting TokenProof for stablecoin / token issuance workflows. As of right now we are gaining a better understanding of how the integration will work with TokenProof and HTS. Their primary requirement is enforceable, on-ledger compliance — particularly around classification and issuance constraints.TokenProof addresses this by moving compliance into the transaction layer, preventing non-compliant minting or transfers from executing. We’re working to formalize a short written statement from their team.
The compliance gating pattern behind TokenProof was previously implemented in a settlement context through SettlementGuard (developed during a FINOS / DTCC hackathon). That work highlighted the need for deterministic, in-transaction compliance enforcement within institutional DvP workflows — specifically to eliminate race conditions between compliance evaluation and settlement execution and to improve auditability. I’m currently following up with FINOS / capital markets participants to provide a concise statement aligned to this pattern in real-world workflows. I’ll follow up shortly with: so the committee has clear evidence on both dimensions. Appreciate the guidance here Best, |
|
You'll need to find a token issuer on Canton, I think. The criteria will be somewhat different in a privacy-first chain. |
|
Thanks Wayne — that’s a helpful clarification and makes sense given the privacy-first model on Canton. I’m now focusing specifically on validation from a Canton-native issuer. I’m already in discussions with Brale around potential integration, which aligns closely with TokenProof’s use case (stablecoin issuance and compliance-gated transfers on Canton). I’m working to formalize a short statement from their team on how this would apply to their workflows. I’ll follow up shortly with that, along with the institutional validation I’m lining up in parallel. Appreciate the guidance |
|
I’ve also posted a follow-up in grants-discuss specifically asking for input from Canton-native token issuers (CIP-0056 / stablecoin / DvP workflows) to gather that validation. I’ll share updates here as soon as I have a concrete signal. |
|
@waynecollier-da We’ve received validation from LongView Compute LLC (LongView Crew — multi-tenant NFT issuer platform on Canton) confirming the value of this approach: “On-ledger enforcement at the controller level would close the ‘compromised issuer credentials’ gap cleanly.” “Having compliance state stamped into the transaction makes the audit inherent to the ledger — no separate system to reconcile.” They also noted that while race conditions are less acute for single-mint NFTs, eliminating off-ledger consistency issues is architecturally cleaner—particularly for higher-frequency issuance and DvP-style flows. I’m continuing to follow up with additional Canton issuers (including Brale) and will share further signals as they come in, but wanted to provide this concrete validation in the meantime. |
|
Im continuing conversations with LongView Compute LLC (multi-tenant issuer platform), and we’ve been working through how this maps directly into their minting and issuer lifecycle workflows. Based on that exchange, we’re now setting up next steps to walk through their architecture in more detail and map enforcement into their transaction flow (issuer good-standing checks, quota constraints, and policy versioning at execution). Will keep you posted as this progresses and as we formalize validation. |
Development Fund Proposal Submission
Proposal file:
Find the Proposal at https://github.com/Mharris40/canton-dev-fund/blob/proposal-tokenproof/proposals/tokenproof.md
Summary
TokenProof is a shared, open-source compliance primitive for the Canton Network — designed to be reusable across CIP-0056 token implementations and DvP settlement workflows.
The PoC is already running on Canton local ledger. This is a production hardening proposal, not a greenfield request.
CI evidence — all 3 DAML packages green
dpm build --all+dpm testpassing on every push to main.daml/— ComplianceProof, ComplianceGuard, EvaluationRequestexamples/cip0056-gated-transfer/— TokenBond atomic DvPexamples/stablecoin-genius-act/— GENIUS Act stablecoindpm test output (all 5 tests passing):
Key behaviours verified:
decisionStatus == ActivesubmitMustFail) when Revoked or Suspended — atomic compliance gate confirmedProblem this solves
Digital asset regulation is shifting from disclosure-based to enforcement-based compliance. GENIUS Act, CLARITY Act, and SEC/CFTC guidance all share a common requirement:
Today, RWA workflows perform compliance checks off-ledger before submitting a transaction. This creates:
This is not just an architectural limitation — it is a regulatory exposure.
What TokenProof enables
Why Canton — architectural requirement
This pattern depends on three properties unavailable on public chains:
Without all three, compliance cannot be both enforceable and private. This is why compliance gating today is implemented off-chain in other ecosystems — introducing the gaps described above. Canton is the only environment where this enforcement model can be implemented natively.
Alignment with approved Dev Fund investments
Day 1 use cases
The atomic compliance gating pattern was previously validated via SettlementGuard (FINOS / DTCC hackathon). TokenProof generalises that pattern into a reusable ecosystem primitive.
No overlap statement
This proposal does not overlap with any existing PR in the canton-dev-fund queue.
It is not a dev tooling proposal, not a token standard change, and not a synchronizer/infrastructure proposal. It is a new application-layer primitive: reusable on-ledger compliance enforcement for Canton.
PRs reviewed: #3, #4, #5, #6, #7, #8, #9, #97, #130 — no overlap.
Checklist
/proposals/dpm build --all+dpm teston 3 packages