Skip to main content

Application Specific Confidential Vault

The ASCV (Application Specific Confidential Vault) is the next generation architecture for GHOST. It replaces the generic Chainlink vault with a purpose built system that uses zero knowledge proofs to achieve full amount privacy, address privacy, and verifiable computation.

note

The ASCV is a future design target. The current implementation uses Chainlink's generic vault with off chain balance tracking.

Why a Custom Vault

The generic Chainlink Compliant Private Transfer vault provides basic shielded balance tracking but lacks several features that GHOST needs for production:

LimitationImpactASCV Solution
No collateral locking primitiveCollateral locks are tracked in server memory, creating a trust dependencyOn chain Pedersen commitments with ZK lock proofs
No on chain verifiability of matchingUsers must trust CRE executed matching correctlyZK proofs of correct rate ordering and fill
Amount visibility to vault operatorThe vault operator can see all balances and transfersPedersen commitments hide amounts; only ZK proofs verify correctness
No stealth addressesRecipient addresses are visible in transfer recordsElliptic curve Diffie Hellman stealth addresses
No liquidation hooksLiquidation requires external trigger and fund movementOn chain liquidation with ZK collateral adequacy proof

Architecture Layers

The ASCV introduces four smart contracts:

ContractPurpose
GhostVaultCore vault: deposits, withdrawals, commitment storage, proof verification
CollateralManagerCollateral locking, health factor verification, liquidation execution
LoanLedgerLoan lifecycle tracking with privacy preserving records
GhostRouterEntry point that coordinates operations across contracts

All contracts use the UUPS proxy pattern with a 48 hour timelock and 3/5 multisig for upgrades.

Privacy Properties

PropertyMechanism
Amount privacyPedersen commitments: C = v*G + r*H where v is amount, r is blinding factor
Address privacyStealth addresses via ECDH key exchange
Rate privacyECIES encryption (unchanged from current design)
Computation privacyZK proofs verify CRE executed correctly without revealing inputs
Compliance privacyZK KYC proofs verify eligibility without revealing identity

Trust Model Comparison

EntityCurrent TrustASCV Trust
ServerStores amounts in plaintext (but cannot move funds)Stores only commitments and ciphertexts
CRETrusted for correct matching (not verifiable)Generates ZK proofs that anyone can verify
VaultOperator sees all balancesOnly commitments visible; amounts hidden
UsersTrust CRE for fair matchingCan verify matching proofs on chain

The ASCV shifts from "trust CRE" to "verify CRE" for matching correctness, while maintaining CRE as the computation engine that generates proofs.

Transition Strategy

The migration from the current architecture to ASCV follows a phased approach:

PhaseDescriptionDuration
Phase 1: ParallelDeploy ASCV alongside existing vault. New deposits go to ASCV.4 weeks
Phase 2: ParityBoth systems operational. Verify ASCV correctness under production load.4 weeks
Phase 3: MigrationMigrate existing positions from old vault to ASCV.2 weeks
Phase 4: StandaloneDecommission old vault. ASCV is sole custody layer.Ongoing

During Phase 1 and 2, the CRE operates dual workflows: one for the old vault and one for ASCV.