Home Protocol SELA Link SELA App SELA Connect
Version 2.0 — Approved for Development

The SELA Protocol

The constitution of digital identity. A set of established rules and procedures designed to provide Breach-Nullification across every interaction in the ecosystem.

SELA Protocol blockchain

Breach-Nullification, Not Breach-Prevention

Traditional cybersecurity focuses on preventing breaches—building higher walls, stronger firewalls, more complex encryption around centralized data stores. This approach has a 100% failure rate over sufficient time.

SELA takes a fundamentally different approach: make breaches irrelevant. If the server never stores readable personal data, there is nothing meaningful to steal. The SELA Server acts strictly as a "Blind Relay" and "encrypted vault."

Even in the event of a complete server compromise, no readable user data is exposed. The attacker finds only encrypted blobs that require the user's private key—which exists only on the user's device.

SELA beacon

Three Protocol Layers

Each layer serves a distinct purpose in the trust chain, from blockchain anchoring to encrypted storage to business logic.

L1

The Trust Layer

Polygon Blockchain — SELARegistry.sol

The immutable trust anchor. Every verification event in SELA produces an on-chain hash—the audit trail. Public key management and verification logging happen here. No PII is ever written to Layer 1. Only cryptographic hashes that prove events occurred without revealing any personal data.

L2

The SELA Vault

Storage & Recovery — Hybrid Encryption (ECIES)

Allows users to recover their documents if they lose their device, without trusting the server. Data is encrypted with a random AES-256-GCM key, then the AES key is encrypted with the user's public key. The server stores the encrypted blob—it cannot decrypt it. Recovery requires the user's 12/24-word seed phrase to regenerate their private key.

L3

The "Doc or Proof" Logic

Core Business Logic for SELA Link

Two verification modes: Proof (ZKP)—confirms a fact without sharing data (e.g., "Over 18" returns True, no dates shared). Doc (Restricted Sharing)—for regulatory KYC where seeing the ID is mandatory, generates a signed URL valid for 5 minutes with no download or right-click, temporary key discarded after session.

Trust Without Liability

The Gatekeeper Rule

Before any request reaches the user's app, the SELA Server validates the requesting organization. Is it active and paid? If not, the request is blocked at the server level. Users are never bothered by spam.

Privacy Masking (PBX)

SELA Link agents can call users without seeing their phone numbers. The server bridges calls via Click-to-Dial—neither side sees the other's real number. Same applies to email relay with DID-based masking.

App Attestation

Every request from SELA App includes an OS-level Integrity Token (Play Integrity / DeviceCheck). The server verifies this token before processing any vault upload or verification response—ensuring the client is trusted.

Four Roles. Zero Knowledge.

The SELA Server is the back-office and router. It is Zero-Knowledge regarding PII—it never sees, stores, or processes personal data in readable form.

Role 1

Vault Manager

Stores only AES-256-GCM encrypted blobs for user recovery. Cannot decrypt any stored data—only the user's private key can unlock the vault.

Role 2

Audit Center

Logs requests and transactions on-chain via Polygon. Creates an immutable, verifiable trail of every verification event without exposing content.

Role 3

The Gatekeeper

Approves or declines SELA Link requests based on partner status. Ensures only active, verified organizations can initiate verification flows.

Role 4

PBX & Email Relay

Manages DID-based masking for phone calls and emails. Bridges communication without ever exposing real contact details of either party.

Hybrid Encryption Architecture

SELA uses ECIES (Elliptic Curve Integrated Encryption Scheme) for vault operations. Each document is encrypted with a unique AES-256-GCM key, then that key is encrypted with the user's ECDSA public key derived from their seed phrase.

AES-256-GCM

Military-grade symmetric encryption for document payload

ECIES Key Wrapping

Asymmetric encryption of the AES key with user's public key

BIP39 Seed Phrase

12-word mnemonic for deterministic key recovery

PBKDF2 Key Derivation

100,000 iterations with SHA-256 for settlement operations

Encryption chain

Protocol Questions

Nothing meaningful is exposed. The server only stores encrypted blobs that require the user's private key to decrypt. That key exists only on the user's device. An attacker would find gibberish—no names, no addresses, no documents.
When an organization needs to verify a fact (e.g., "user is over 18"), the SELA App performs the calculation locally (BirthDate < Today - 18 years) and signs a True/False result with the user's private key. The organization receives a cryptographically signed proof without ever seeing the date of birth.
Proof (ZKP): Used for age verification, login, human checks. Returns only True/False. Doc (Restricted Sharing): For banking KYC/AML where seeing the ID is mandatory. Generates a time-limited (5-minute) secure viewer URL with no download capability. The temporary encryption key is discarded after the session ends.
SELA uses Polygon for on-chain operations. Polygon provides fast, low-cost transactions ideal for logging verification events. Only cryptographic hashes are written on-chain—never personal data. The blockchain serves as an immutable audit trail proving that verification events occurred.
When you set up SELA, you receive a 12-word BIP39 seed phrase. If you lose your device, install SELA on a new phone, enter your seed phrase, and the app regenerates your private key. It then downloads the encrypted vault backup from the server and decrypts everything locally. The server never has access to your data during this process.

Build on the SELA Protocol

Integrate breach-nullification into your organization's verification workflow.

Integrate SELA Link Deploy SELA Connect