VCA Token (one time use program)
The VCA Token (Visual Cryptographic Authentication Token) is a foundational element of Interstellar’s security architecture. It is a one-time-use program, compiled from a master circuit, that enforces computation privacy, human-verifiable interaction, and SE-anchored execution integrity. It is used both for transaction and sensitive action validation and as a secure file format for recovery.
Unlike traditional signature schemes or passcode validation logic, a VCA Token executes as a garbled circuit entirely on the user’s mobile device. Its result is cryptographically signed using Secure Element (SE) entropy, and can be verified by the blockchain node through a dedicated AUTH
or recovery extrinsic.
Core Objectives
- Privacy-preserving local execution: All logic is evaluated client-side in a secure environment.
- Tamper-proof: The token is unreadable and unreplicable due to one-time garbling.
- Human-in-the-loop: Users verify the transaction visually via randomized code or keypad inputs.
- Cryptographically verifiable: Nodes verify execution using a signature derived from the SE.
Use Cases
Action and Transaction Validation (TAVP)
Used in the Trusted Action Validation Protocol, the VCA Token presents a transaction or sensitive action message associated with a randomized keypad for the user to enter a short code. The input is evaluated securely and signed via SE.
Recovery File
Used as a secure file for recovery, the VCA Token is stored in the cloud or locally. When executed during a recovery flow, it confirms user intent and provides a proof of interaction, without ever exposing the recovery secret.
Token Lifecycle
-
Generated from a Master Circuit
- A high-level circuit defines the logic and input layout
- Can include UI elements like digits, code challenge, recipient identity
-
Garbled in TEE
- Garbled and randomized by a custom pallet inside a TEE
- Produces a one-time, encrypted, non-reusable circuit file
-
Registered On-Chain
- A cryptographic fingerprint (hash) is submitted via the
VCA Token Registry
- A cryptographic fingerprint (hash) is submitted via the
-
Executed on Mobile
- User interacts with a visual flow (e.g., code input or message confirmation)
- Output is signed using SE-derived entropy
-
Verified On-Chain
- The result is submitted to the runtime using
AUTH
or recovery extrinsics - The node verifies both the fingerprint and the SE-bound signature
- The result is submitted to the runtime using
Execution Integrity
To ensure the token cannot be forged or replayed:
- A signature from the Secure Element is used as a protected random input to the circuit
- This input is unique per execution and included in the final proof
- The node verifies that this SE signature matches the expected user and session
This mechanism guarantees that only a valid device executing the correct circuit logic can produce an acceptable result — making it impossible to spoof even if the file is leaked.
Summary
The VCA Token acts as a verifiable cryptographic contract, executed on the user’s device and cryptographically sealed. It bridges UX simplicity (2-digit codes, visual validation) with deep security guarantees (garbled logic, SE verification, on-chain proof), and plays a central role in Interstellar’s authentication, recovery, and transaction control architecture.
To learn more about the advanced technology and cryptographic mechanisms that power the VCA Token — which securely manages the one-time keypad and dynamic message display — we invite you to explore the following concepts:
- Garbled Circuits: A privacy-preserving computation technique used to ensure that sensitive data is never exposed during processing, even on potentially compromised devices.
- Dynamic Visual Cryptography: A novel method for rendering secure information (such as digits or transaction messages) that is only decipherable by the human eye under specific visual and cognitive conditions, making it resistant to automated interception or spoofing.
These technologies are foundational to the VCA Token’s ability to deliver military-grade transaction security on consumer-grade mobile devices.