Every other chain faces an impossible choice: adopt post-quantum cryptography and lose 85–90% throughput, or stay fast and stay vulnerable. ACE Chain eliminates this tradeoff entirely. O(n) per-signature verification → O(1) single ZK proof. One Groth16 pairing (~0.5ms) replaces thousands of signature checks. The PQC era arrives with no performance cost.
Not an app. Not a service. Not a smart contract. HFI-Pay and VA-DAR are built into the protocol itself — send crypto to any email or phone number, and recover your wallet with just a password and human-memorable identifier. Crypto addresses become an implementation detail, not a user burden.
Self-custody, inheritance, and yield generation — every blockchain before ACE Chain forced you to pick two. Identity-authorization separation resolves this trilemma: CT-DAP enables dormant inheritance paths without exposing keys, while self-custody and DeFi yield coexist in one identity framework. Millions of BTC lost forever? Never again.
Execution-only peak of 170K–340K TPS on a single shard. Identity-based partitioning enables linear throughput scaling — add shards, multiply capacity, with zero cross-shard state sync. ~600ms hard finality. <$0.01 per million transactions. Infrastructure cost 60× lower than Solana.
The Agent Economic Sovereignty Protocol gives AI agents cryptographic policy boundaries, privacy-preserving micro-settlement, and A2A interoperability — all on-chain. Sub-second finality and <$0.001 fees make high-frequency agent transactions economically viable. Humans set policy; agents execute autonomously within bounds.
Zero-knowledge identity commitments mean your on-chain identity reveals nothing about your keys, algorithms, or real-world identity. ZK proofs verify credentials without exposing them. Selective disclosure lets you prove what you need — age, jurisdiction, accreditation — without revealing anything else.
FIPS 204 ML-DSA-44 signatures meet federal cryptographic standards today. Identity-authorization separation enables selective KYC/AML attestation without breaking pseudonymity. Institutions get the compliance proofs they need; users keep the privacy they deserve. Built for the regulatory reality of 2025+.
Self-custody, inheritance, and yield generation — pick two. Losing a private key means losing everything. Death of a holder means permanent asset loss. Millions of BTC are already gone forever.
Every transaction requires per-signature verification at the consensus layer. Ed25519 takes ~76μs per signature. This is the primary throughput bottleneck across all Layer-1 chains, capping TPS at the verification speed.
When Shor's algorithm breaks elliptic curves, replacing the signature algorithm means replacing every user's identity. State migration, contract updates, address changes — an ecosystem-wide catastrophe.
Identity-authorization separation is not a feature — it is a generative principle. From this single design decision, six previously independent problems resolve simultaneously:
Sign EVM, SVM, BVM, and TVM transactions with post-quantum ML-DSA-44 signatures — today. The authorization layer verifies PQC signatures before execution; VM engines are completely algorithm-agnostic. No need to wait for Ethereum or Solana to upgrade. Deploy your Solidity contracts on ACE Chain and get quantum protection with zero code changes.
→Ed25519 and ML-DSA-44 coexist as first-class peers at every protocol level — consensus, account, and client. Legacy wallets (MetaMask, Phantom) and PQC wallets (Yallet) share the same accounts and balances.
→Native, EVM, SVM, BVM, and TVM engines share a unified state tree. Cross-VM asset transfers are balance changes on a unified ledger — no wrapping, no bridging. Each VM maps idcom to its native address format automatically. Future VMs inherit full infrastructure with zero integration cost.
STARK/FRI proofs batch-verify all credentials in a block. Verification cost is O(1) regardless of transaction count. 128-bit post-quantum security for the proof system itself. No trusted setup required.
Send crypto to an email or phone number. Recipients claim funds by verifying their identity — no wallet needed upfront. Intent-based architecture handles discovery, locking, and settlement automatically.
→Recover your wallet with just a password and human-memorable identifier. No seed phrase backup. No centralized custodian. Encrypted artifacts stored on-chain with enumeration-resistant addressing.
Create dormant inheritance paths that activate only upon holder death or incapacitation. Beneficiaries inherit assets without ever having access to the holder's private key material. Self-custody, yield, and inheritance — all three, simultaneously.
Sub-second finality and <$0.001 transaction fees make on-chain micro-payments economically viable. AI agents can execute high-frequency economic actions with cryptographic policy boundaries, settling directly on-chain.
| Capability | ACE Chain | Ethereum | Solana |
|---|---|---|---|
| Native PQC Signatures | ML-DSA-44 (FIPS 204) | None (EIP-7702 proposed) | None |
| Identity Model | idcom (ZK commitment) | Public key hash | Public key |
| PQC Migration Cost | Zero (parameter switch) | Full state migration | Full state migration |
| PQC Impact on TPS | 0% (decoupled layers) | ~85% drop projected | ~90% drop projected |
| Verification Cost | O(1) via ZK batch | O(n) per-sig | O(n) per-sig |
| Multi-VM Execution | EVM + SVM + BVM + TVM | EVM only | SVM only |
| Cross-VM PQC | All VMs inherit PQC | N/A | N/A |
| Human-Friendly Payments | Email / phone native | ENS (paid, manual) | SNS (paid, manual) |
| Serverless Recovery | VA-DAR on-chain | Seed phrase only | Seed phrase only |
| Inheritance | CT-DAP (dormant paths) | Key exposure required | Key exposure required |
The cryptographic foundation — identity-authorization separation, deterministic multi-algorithm key derivation, and zero-knowledge identity commitments.
O(1) verification through recursive STARK proofs, batch credential verification, and post-quantum-secure proof composition.
The execution runtime that unifies identity verification, ZK proof generation, and transaction processing into a single sub-second pipeline.
Multi-virtual-machine execution with a unified state tree — EVM, SVM, BVM, and TVM sharing identity and token balances natively.
Lightweight mempool propagation without on-path proofs — solving the bandwidth challenge of 2420-byte ML-DSA-44 signatures at scale.
Serverless wallet recovery using on-chain encrypted artifacts and human-memorable identifiers, with enumeration-resistant addressing.
Crypto-asset inheritance without key exposure — dormant authorization paths that activate only upon verifiable trigger conditions.
Agent economic sovereignty — policy-bounded spending, privacy-preserving micro-settlement, and A2A interoperability on-chain.
The complete technical specification — from cryptographic primitives to consensus design.
Redefining Blockchain Identity from Cryptographic Primitives. Covers ACE-GF foundations, n-VM architecture, ZK-compressed verification, PQC-Shielded Cross-VM execution, and economic analysis.
Download PDF