Every routing decision attested. Every computation proven. Every handoff verifiable.
H33 FHE-IQ Router v3.0
The Axis
"The axis is not 'TFHE vs not.' The axis is: what do you already know vs what must be computed."
CLASS 1 — INGRESS CONSTRAINTS
Always available. Caller-supplied. Hard filters.
CLASS 2 — EXTERNAL ATTESTATIONS
Signed objects from outside. Available before compute.
CLASS 3 — DERIVED TAGS
Computed metadata. Available only after derivation.
The Flow
Ingress + Attestations
Caller-supplied constraints (Class 1) and signed attestations (Class 2) enter together. Both available before any computation begins.
↓
STAGE 1 ROUTER
Hard filters + authorization checks + attestation hints. Determines initial routing path based on what is known at ingress time. No FHE required at this stage.
↓
A: ExecuteB: Execute + DeriveC: Derive First
Path A: All constraints satisfied, proceed directly to execution engine. Path B: Execute and derive additional tags for downstream consumers. Path C: Missing derived tags required. Compute them first, then re-route via Stage 2.
↓
[Optional Stage 2 if C] → EXECUTION ENGINE
If Path C was taken: Stage 2 router re-evaluates with newly derived Class 3 tags. Then dispatches to the correct execution engine (FHE, ZKP, or plaintext pipeline).
↓
RESULT CLAIM
The execution engine produces a cryptographic result claim. This includes the computation output and a proof of correct execution.
↓
H33-74 SUBSTRATE
All six routing fields committed to a single 74-byte post-quantum substrate. 32 bytes on-chain, 42 in Cachee. Quantum-resistant. Permanently anchored to Bitcoin.
SHA3-256 of the original ingress payload. Proves exactly what data entered the system. Tamper-evident: any modification breaks the chain.
2
stage1_routing_hash
›
Hash of Stage 1 routing decision: which claims were evaluated, which constraints matched, which path (A/B/C) was selected. The "how it was routed" proof.
3
tag_bundle_hash
›
Hash of all derived Class 3 tags. These are computed metadata tags generated during processing. Proves what additional information was derived.
4
stage2_routing_hash
›
Hash of second-pass routing decision (if Path C was taken). Proves the re-routing after tag derivation was deterministic and correct.
5
dispatch_hash
›
Hash of the execution engine selection. Proves which specific engine (FHE pipeline, ZKP verifier, plaintext processor) was dispatched.
6
execution_root
›
Merkle root of execution results. Proves what actually happened: inputs, outputs, intermediate states. The final cryptographic commitment.
All six fields committed to a single 74-byte H33-74 substrate. Click any field to expand.
Authorization Model
"Data provenance without control integrity is insufficient."
ACTION_AUTHORIZED
Mandate covers this action
The caller's mandate explicitly authorizes this specific action type. Carries: mandate_id, action_type, scope constraints, expiration. Without this claim, the request never enters Stage 1.
DELEGATION_CHAIN_VERIFIED
Authority chain is valid
The delegation chain from principal to actor is complete and verified. Carries: chain of signer public keys, delegation depth, constraint narrowing at each level. Ensures no authority escalation.
SIGNATORY_VALID
Signer identity confirmed
The cryptographic identity of the signatory is verified against the authority registry. Carries: public key fingerprint, identity attestation, key validity window. PQ-signed (ML-DSA).
CUSTODIAN_APPROVED
Custodian has signed off
The custodian responsible for the underlying asset has approved this operation. Carries: custodian_id, asset_reference, approval_timestamp, conditions. Required for settlement.
LIMIT_WITHIN_BOUND
Within risk limits
The operation is within all applicable risk limits (position, notional, concentration, counterparty). Carries: limit_type, current_exposure, limit_value, headroom. Real-time check.
Bond Trade Example
1
Trader submits bond trade
SUBMITTED
2
ACTION_AUTHORIZED: mandate covers instrument
✓
3
LIMIT_WITHIN_BOUND: within risk limit
✓
4
DELEGATION_CHAIN_VERIFIED: authority from desk
✓
5
CUSTODIAN_APPROVED: settlement confirmed
✓
6
All four present → Stage 1 proceeds
ROUTED
HARD REJECT — reason_code: LIMIT_EXCEEDED — "Position limit for UST 10Y would be breached by $2.4M notional. Current: $47.6M / $50M limit."
Time Semantics
Every claim carries temporal bounds. Expired claims are not degraded — they are absent.
effective_at
Start
When this claim becomes active. Before this timestamp, the claim does not exist.
pricing_timestamp
T+0
The exact moment the price was observed. Immutable reference point for valuation.
market_context
Hours
Trading hours window. Defines when the market session was open for this price.
valid_until
Hard cutoff
Hard expiration. After this timestamp, the claim is ABSENT. Not degraded. Absent.
settlement_window
T+1/T+2
Settlement deadline. The window within which the transaction must settle.
bond_maturity
30Y
Bond maturity date. 30-year horizon. The substrate chain must survive this long.
"Expired is absent. Not degraded. Absent. Always."
Multi-Party DAG
Bond Trade Lifecycle — Four Parties, One Verifiable Chain
NODE 1
Trade Creation
Broker
→
NODE 2
Validation
Exchange
→
NODE 3
Clearing
Clearinghouse
→
NODE 4
Settlement
Custodian
Broker creates the trade with ingress constraints. H33-74 substrate commits: ingress_hash (trade terms), stage1_routing_hash (mandate check), execution_root (order created). The execution_root becomes the next node's ingress_hash.
Exchange validates the trade. ingress_hash = Node 1's execution_root. Adds: market validation, price reasonability check, crossing engine match. New H33-74 substrate for this node.
Custodian settles the trade. ingress_hash = Node 3's execution_root. Adds: DvP confirmation, asset movement, final settlement proof. Bitcoin-anchored H33-74 substrate. End of chain.
ingress_hash → execution_root references link nodes
"Any party can verify their node without accessing any other party's systems."
Dispute Model
ORIGINAL TRANSACTION
↓
DISPUTED
Workflow suspends. All downstream operations halt.
↓
SETTLED_DISPUTE
Resolution — select an outcome:
ORIGINAL STANDS
AMENDMENT
REVERSAL
"All correction events are themselves H33-74 committed. The correction chain is as permanent as the original."
Regulatory Profiles
Profiles are additive. When multiple profiles apply, stricter wins.
SEC_REPORTING
Trade reporting
Requires: full audit trail, T+1 reporting, position transparency, beneficial ownership disclosure. Maps to: ingress_hash, execution_root, tag_bundle_hash fields.
BASEL_III_RISK
Capital adequacy
Requires: risk-weighted asset computation, leverage ratio tracking, liquidity coverage ratio. Maps to: LIMIT_WITHIN_BOUND claim, real-time position aggregation.
GLBA_PRIVACY
Financial privacy
Requires: PII encryption at rest and in transit, access logging, data minimization. Maps to: FHE-encrypted ingress, H33-74 never contains PII in plaintext.
HIPAA
Health data
Requires: PHI encryption, access controls, audit logging, breach notification. Maps to: FHE computation over encrypted health records, ZKP verification without decryption.
SOLVENCY_II
Insurance capital
Requires: solvency capital requirement (SCR), minimum capital requirement (MCR), own risk assessment. Maps to: claim-aware routing with LIMIT_WITHIN_BOUND for insurance portfolios.
Requires: 30-year custody chain, PQ-resistant signatures, annual attestation, ZK redemption proof. The crown jewel of H33 regulatory compliance.
BitBond Lifecycle
30-Year Digital Treasury Bond — Full DAG
ISSUANCE
Year 0
→
CUSTODY_INIT
Year 0
→
ANNUAL_ATTEST
Year 1
→
. . .
Years 2-29
→
MATURITY_TRIGGER
Year 30
→
ZK_REDEMPTION
Year 30
→
SETTLEMENT
Year 30
ISSUANCE — Treasury issues the digital bond. H33-74 substrate commits: CUSIP, face value, coupon rate, maturity date, initial holder. PQ-signed by issuing authority. Bitcoin-anchored at issuance.
CUSTODY_INIT — Custodian accepts the bond into custody. H33-74 references ISSUANCE execution_root. Custodian's PQ signature attests safekeeping. Begins the 30-year chain.
ANNUAL_ATTESTATION — Each year, the custodian produces a proof-of-custody attestation. H33-74 substrate chains from the previous year. Proves: bond still in custody, no disputes, coupon payments processed. 30 attestation nodes form the spine of the DAG.
MATURITY_TRIGGER — Automated trigger when the maturity date is reached. Confirms all 30 annual attestations are present. Enables the redemption workflow.
ZK_REDEMPTION — Zero-knowledge proof of valid redemption. Proves: valid CUSIP, not previously redeemed, no active disputes, maturity reached, valid holder. Reveals only: CUSIP, validity boolean, redemption amount. No trusted third party required.
SETTLEMENT — Final DvP settlement. Bond extinguished, principal returned. Final H33-74 substrate Bitcoin-anchored. The entire 30-year chain is now permanently verifiable by any party, forever.
ZK Redemption Proof
PROVES
Valid CUSIP in registry
Bond not previously redeemed
No active disputes on record
Maturity date has been reached
Holder is valid and authorized
REVEALS
CUSIP (public identifier)
Validity (boolean: yes/no)
Redemption amount
DOES NOT REVEAL
Holder identity
Other portfolio positions
Acquisition price or history
Intermediate custody transfers
"No trusted third party. No phone call. Mathematical proof."
What H33-74 Proves
Honest scope — what the substrate guarantees and what it does not
PROVES
Specific inputs entered the system
Specific routing decisions were made
Specific execution engine was selected
Specific result was produced
Cryptographic chain links all steps
Quantum-resistant signature integrity
DOES NOT PROVE
Tag derivation algorithm correctness
External attestation truthfulness
Routing decision optimality
Computation engine bug-freedom
Ingress constraints and external attestations drive initial routing. Derived tags tighten later routing and become reusable assets. H33-74 attests the ingress basis, routing decisions, and execution lineage — across single operations, multi-party workflow DAGs, and decade-scale custody chains alike.
Can you prove that the right person was authorized to act, on the right data, under the right policy, at the right time, with the right result, across every party in the workflow?
The answer is yes.
That is what banks buy.
That is what regulators require.
That is what BitBonds need. That is what H33 provides.