Quantum Grid Background
NIST LEVEL 5 SECURITY · NEO N3 POWERED

SECURE THE
QUANTUM FUTURE

Post-quantum cryptographic toolkit with natural language AI. Just talk to Anubis—sign contracts, register deeds, create wills, anchor to blockchain. Powered by SpoonOS. Anchored on Neo N3.

anubis-chatSpoonOS Agent
Sign my contract
Anubis:
I found contract.pdf on your Desktop. I'll sign it with ML-DSA-87 post-quantum cryptography. This operation is FREE. Proceed? [Yes/No]
Yes
Anubis:
Signed successfully! • Document: contract.pdf • Signature: contract.pdf.sig • Algorithm: ML-DSA-87 (post-quantum secure) • Fingerprint: `7A3B9C2D...`

You:

CRYPTOGRAPHIC ALGORITHMS

Built on NIST-standardized post-quantum cryptography with CNSA 2.0 compliance.

ALGORITHM SPECIFICATIONS

ComponentAlgorithmStandardSecurity Level
Digital SignaturesML-DSA-87FIPS 204NIST Level 5 (256-bit quantum)
Key EncapsulationML-KEM-1024FIPS 203NIST Level 5 (256-bit quantum)
Symmetric EncryptionAES-256-GCMFIPS 197256-bit classical
Streaming CipherXChaCha20-Poly1305RFC 8439256-bit classical
HashingSHA-512, SHA3-256FIPS 180-4, FIPS 202256-bit classical
Key DerivationArgon2id, HKDF-SHA512RFC 9106, RFC 5869Memory-hard

CNSA 2.0 PROFILE

Default - NIST Level 5

  • NSA Commercial National Security Algorithm Suite 2.0
  • Approved for government and NSS systems post-2030
  • ML-DSA-87 signatures (4,627 bytes)
  • ML-KEM-1024 encryption (1,568 bytes)
  • SHA-512 hashing

BALANCED PROFILE

NIST Level 3

  • ~40% smaller keys for constrained environments
  • ML-DSA-65 signatures (3,309 bytes)
  • ML-KEM-768 encryption (1,184 bytes)
  • SHA-384 hashing

FIPS 140-3 PROFILE

Regulated Industries

  • FIPS-validated cryptographic module (aws-lc-rs)
  • Required for regulated industries
  • Healthcare, finance, government compliance
SPOONOS v5 · 56,320 LINES · 798 TESTS · 100% PASS

JUST TALK TO ANUBIS

A production-grade natural language cryptography platform with four-layer fee defense, formal verification, RON compliance (47 states), and 64+ operations. Speak naturally—the AI handles everything.

56,320
LINES OF CODE
798
TESTS (100% PASS)
90
PYTHON MODULES
64+
OPERATIONS

FOUR-LAYER FEE DEFENSE

Bulletproof fee collection with formal verification. 8 theorems proven in Coq. Fee bypass is mathematically impossible.

LAYER 1

FeeGate

Pre-flight balance check before any operation. Blocks insufficient funds immediately.

LAYER 2

FeeEscrowManager

Multi-step workflow fee reservation. 11 workflows including marriage (1.20 GAS).

LAYER 3

RetryFeeManager

Transient failure handling with exponential backoff. Auto-retry on network errors.

LAYER 4

FeeMonitor

Real-time anomaly detection. 8 anomaly types flagged automatically.

FORMALLY VERIFIED (Coq)

518-line Coq proof specification. 8 of 11 theorems fully proven including fee_always_collected, no_fee_bypass, and balance_decreases.

MODULE ARCHITECTURE

15 specialized modules with clear separation of concerns. 275 classes, 1,043 functions.

MODULE BREAKDOWN

ModuleLinesPurpose
tests/11,957798 test functions, 100% pass rate
handlers/7,045Intent handlers for all 64+ operations
business/5,794Fee collection, subscriptions, payments
security/4,241Audit trails, anomaly detection, advisors
react/4,151ReAct reasoning loop implementation
compliance/4,121RON (47 states), MISMO, notary tracking
conversation/2,646Natural language flow templates
nlp/853200+ intent patterns, 28 categories
i18n/7036 languages (EN, ES, ZH, FR, DE, JA)

NATURAL LANGUAGE PROCESSING

200+ regex patterns across 28 command categories. Sophisticated linguistic understanding that rivals commercial NLP products.

INTENT CLASSIFICATION

200+ regex patterns organized by priority. More specific patterns evaluated first to prevent false matches. Handles variations like "dead man", "deadman", "dead-man switch" automatically.

# Pattern priority prevents false matches

"check in to my dead man switch"

→ heartbeat (check-in operation)

"if I don't check in, release to my wife"

→ escrow_deadman (dead man creation)

ANAPHORA RESOLUTION

Understands pronouns using conversation context. When you say "anchor it", the system knows "it" refers to the document you just signed.

You: Sign my contract

Anubis: *signs contract.pdf*

You: Anchor it

Anubis: *resolves "it" → contract.pdf*

PARAMETER EXTRACTION

Extracts structured data from messy natural language. Handles file paths, prices, dates, Neo addresses, and relationship terms automatically.

"sell my contract for 5 GAS"

→ {sealed_file: "contract.pdf", price: 5.0}

"release to my wife in 30 days"

→ {beneficiary: "wife", release_date: "2026-02-10"}

INTELLIGENT ERROR RECOVERY

Transforms cryptic technical errors into helpful human guidance. Suggests fixes, offers retry options, and guides users through resolution.

Before: "Error: ENOENT: no such file"

After: "I couldn't find that file. Tell me the name and I'll search for it."

COMPLIANCE & SECURITY

Production-ready legal compliance for Remote Online Notarization (RON) in 47 US states. MISMO compliance for mortgage industry.

RON COMPLIANCE

State-specific requirements for all 47 RON-enabled states. Video recording, ID verification, notary seal, and retention policies.

VATXFLCA+43

AUDIT TRAILS

Comprehensive audit logging with blockchain anchoring. Chain of custody tracking, witness attestation, and video session management.

  • • User requests logged
  • • Tool invocations tracked
  • • Outcomes recorded
  • • Timestamps at each step

ANOMALY DETECTION

Real-time monitoring for suspicious patterns. 8 anomaly types with configurable thresholds.

  • • HIGH_VOLUME
  • • RAPID_OPERATIONS
  • • BYPASS_ATTEMPT
  • • FREE_OP_ABUSE

64+ OPERATIONS

Complete notary toolkit covering documents, escrows, marketplace, vault, ceremonies, and more.

sign
verify
attest
anchor
seal
unseal
vault_upload
vault_download
market_list
market_buy
escrow_timelock
escrow_deadman
escrow_payment
escrow_multisig
marriage_create
rings_mint
will_init
deed_register
batch_add
batch_flush
heartbeat
identity
journal_entry
divorce

+ 40 more operations including contract_amend, will_revoke, deed_transfer, member_mint, privatebatch_keygen...

MULTI-LANGUAGE SUPPORT

Automatic language detection and translation. Speak in your native language—Anubis understands.

🇺🇸
EN
English
🇪🇸
ES
Spanish
🇨🇳
ZH
Chinese
🇫🇷
FR
French
🇩🇪
DE
German
🇯🇵
JA
Japanese
READY TO TALK?
56,320 lines of AI waiting to help you.

POWERED BY NEO N3

Built exclusively on Neo N3 for enterprise-grade blockchain anchoring with dBFT consensus finality.

NEO N3 CAPABILITIES

N3

Document Anchoring

Immutable blockchain timestamps with dBFT finality

~0.01-0.05 GAS

FS

NeoFS Storage

Decentralized file storage with ML-KEM encryption

~0.02 GAS/MB

NFT

NFT Membership

Three-tier membership with on-chain benefits

50-200 GAS/year

SC

Smart Contracts

Marriage, escrow, marketplace, and governance

Varies by operation

CORE CAPABILITIES

Post-Quantum Signatures

Sign files with ML-DSA-87 (FIPS 204), providing NIST Level 5 security against quantum attacks.

ML-KEM Encryption

Seal sensitive data using ML-KEM-1024 (FIPS 203). Auto-upload to NeoFS for decentralized storage.

Neo N3 Anchoring

Immutable timestamps on Neo N3 with dBFT 2.0 one-block finality. Batch anchoring for cost efficiency.

Legal Documents

Marriage contracts, wills, property deeds, business contracts with amendments. All blockchain-anchored.

DK-QSI Identity

Dual-Key Quantum-Safe Identity with on-chain registration, rotation, and revocation.

NFT
NFT Wedding Rings

NEP-11 compliant NFT rings for marriages. Mint, burn on divorce, update vows on anniversaries.

659 CLI Commands

20 command groups: sign, attest, anchor, marriage, will, deed, contract, journal, multisig, and more.

FS
NeoFS + S3 Gateway

Decentralized storage with parallel multipart uploads. Auto-upload sealed files to NeoFS.

PB
Privacy Batches

Collaborative anchoring with ML-KEM key shares. Only Merkle root is public. Forward secrecy.

MS
Multi-Signature

Threshold governance with t-of-n signatures. Propose, vote, execute with on-chain coordination.

JL
Notary Journals

Tamper-evident record keeping. Export to PDF, CSV, JSON. Batch anchor journal entries.

TS
RFC 3161 Timestamps

Integration with external Timestamp Authorities. Request and verify RFC 3161 responses.

SECURE_ANCHOR.SH
$ anubis attest --private --threshold 2

[+] Generating ephemeral session key (ChaCha20-Poly1305)

[+] Splitting key into 3 shares (Shamir Secret Sharing)

[+] Encapsulating shares with ML-KEM-1024

[+] Anchoring Merkle root to Neo N3 Blockchain

STATUS: ANCHORED (Block #245,102)
NEW FEATURE

PRIVACY-PRESERVING
COLLABORATIVE ANCHORING

A revolutionary integration of ML-KEM-1024 that enables forward-secure, private batch anchoring. Multiple parties contribute encrypted "key shares" to secure receipts before they touch the blockchain.

  • Off-Chain PrivacyEncrypted receipts are shared privately; only the Merkle root is public.
  • Forward SecrecyEphemeral keys ensure past data remains secure even if long-term keys are compromised.
  • Threshold RecoveryRequires t-of-n parties to reconstruct keys and decrypt data.
SPOONOS ESCROW PATTERNS

ADVANCED ESCROW WITH NATURAL LANGUAGE

Anubis Notary supports four sophisticated escrow patterns, all accessible through natural language via SpoonOS. Protect assets, automate releases, and coordinate multi-party approvals—just by talking.

TIMELOCK ESCROW

Release assets at a specific date/time

Lock files, documents, or secrets until a specified date. Perfect for embargoed releases, scheduled announcements, or time-delayed inheritance transfers.

Natural Language:

"Lock this document until January 1st, 2027"

→ escrow_timelock

Setup Fee:0.25 GAS
Release:Automatic at timestamp

DEAD-MAN SWITCH

Release if you stop checking in

Assets are released to beneficiaries if you fail to check in within a specified interval. Perfect for digital inheritance, emergency access, or insurance against incapacitation.

Natural Language:

"If I don't check in for 30 days, release my vault to my children"

→ escrow_deadman

Setup Fee:0.25 GAS
Check-in:"I'm still here" resets timer
$

PAYMENT-GATED

Release upon payment confirmation

Assets are released only when a specific payment is confirmed on-chain. Perfect for pay-to-unlock content, conditional sales, or escrow services.

Natural Language:

"Release this file when Alice pays 100 GAS"

→ escrow_payment

Setup Fee:0.25 GAS
Release:Automatic on payment
2/3

MULTI-SIG ESCROW

Release requires multiple approvals

Assets require t-of-n signatures to release. Perfect for corporate governance, joint accounts, or trustee-controlled assets.

Natural Language:

"Require 2 of 3 board members to release company funds"

→ escrow_multisig

Setup Fee:0.50 GAS
Release:When threshold met

CONVERSATIONAL ESCROW SETUP

Setting up a dead-man switch through natural conversation

You:

"I want to set up a dead-man switch for my crypto wallet keys"

Anubis:

"I'll help you create a dead-man switch. This will:

• Encrypt your wallet keys

• Require periodic check-ins from you

• Release to beneficiaries if you miss check-ins

Who should receive the keys if you don't check in?"

You:

"My wife Sarah and my brother Mike"

Anubis:

"Got it. How often should I expect a check-in from you?"

You:

"Every 30 days"

Anubis:

"Perfect. Here's your dead-man switch configuration:

• Asset: wallet_keys.enc (encrypted)

• Check-in interval: 30 days

• Beneficiaries: Sarah, Mike

• Release: Both receive decryption key

Cost: 0.25 GAS (~$0.10). Proceed? [Yes/No]"

You:

"Yes"

Anubis:

"✓ Dead-man switch activated!

• Escrow ID: ESC-2026-0111-7A3B

• Next check-in due: February 10, 2026

I'll remind you 3 days before each deadline. Just say 'I'm still here' to check in."

MORE ESCROW EXAMPLES

"Lock until my 18th birthday"

→ escrow_timelock

"Release when invoice is paid"

→ escrow_payment

"Need 3 of 5 trustees to approve"

→ escrow_multisig

"If I'm gone, give this to my kids"

→ escrow_deadman

"Embargo until press release date"

→ escrow_timelock

"Unlock when buyer sends 50 GAS"

→ escrow_payment

"Both parents must approve"

→ escrow_multisig

"Check in weekly or release"

→ escrow_deadman

ESCROW SETUP FEES

  • Timelock escrow0.25 GAS
  • Dead-man switch0.25 GAS
  • Payment-gated0.25 GAS
  • Multi-sig escrow0.50 GAS

ESCROW OPERATIONS

  • Check-in (dead-man)FREE
  • Add signer (multisig)0.10 GAS
  • Approve releaseFREE
  • Cancel escrow0.10 GAS

MEMBERSHIP BENEFITS

  • Free tierNo escrow
  • Notary (50 GAS/yr)Timelock only
  • Vault (200 GAS/yr)All 4 patterns

1 GAS ≈ $0.40 USD

FORMAL VERIFICATION

We don't just write code; we prove it. Anubis Notary uses state-of-the-art formal methods to ensure mathematical correctness with 34+ verified pure functions and 6 LibFuzzer targets for continuous testing.

Rocq / CoqCryptographic proofs
RefinedRust34+ verified functions
LibFuzzer6 fuzz targets
Iris LogicSeparation logic specs

CRYPTO PRIMITIVES

Built on the bedrock of NIST-standardized post-quantum algorithms (FIPS 203 & 204).

ML-DSA-87DIGITAL SIGNATURES
ML-KEM-1024KEY ENCAPSULATION
Argon2idKEY DERIVATION
SHA3-256/SHAKE256HASHING (FIPS 202)
ChaCha20Poly1305AUTHENTICATED ENCRYPTION
Shamir Secret SharingTHRESHOLD CRYPTO
CBOR (RFC 8949)CANONICAL ENCODING

PERFORMANCE BENCHMARKS

Measured on modern hardware. All cryptographic operations are constant-time and formally verified.

CRYPTOGRAPHIC OPERATIONS

OperationTimeMemory
Key generation~100ms1-4 GiB
Sign (ML-DSA-87)~5ms~10 MB
Verify (ML-DSA-87)~2ms~5 MB
ML-KEM encapsulate~1ms~2 MB
ML-KEM decapsulate~1ms~2 MB
SHA3-256 (1 MB)~5ms~1 KB

NEO N3 ANCHORING

OperationTimeCost
Single Anchor~15s~0.01 GAS
Batch Anchor (8)~15s~0.012 GAS
Identity Register~15s~0.02 GAS

dBFT 2.0: ONE-BLOCK FINALITY

Neo N3's Delegated Byzantine Fault Tolerance provides immediate, irreversible finality in a single block (~15 seconds). No confirmations needed—once anchored, your document proof is permanently immutable.

# Anchor with instant finality
$ anubis-notary anchor neo anchor document.pdf

NEO N3 BLOCKCHAIN INTEGRATION

Anubis Notary leverages Neo N3's dBFT 2.0 consensus for one-block finality, NeoFS for decentralized storage, and smart contracts for immutable anchoring.

N3

dBFT 2.0 CONSENSUS

Delegated Byzantine Fault Tolerance provides one-block finality—no waiting for confirmations. Once anchored, it's permanent.

$ anubis-notary anchor neo time
Block: 245,102 (Final)

NOTARY ORACLE V2

Smart contract deployed on TestNet (0xff099c61...) handles anchoring, batch operations, and Quantum-Safe Identity (QSI) registration.

Single Anchor~0.1 GAS
Batch (8 roots)~0.15 GAS
Savings8x reduction

NEOFS STORAGE

Decentralized object storage with S3-compatible API, content-addressed (CID) files, and automatic ML-KEM-1024 encryption.

$ anubis-notary anchor neo
neofs-store doc.pdf --encrypt
[+] Encrypted with ML-KEM-1024
QUANTUM-SAFE IDENTITY

DUAL-KEY QSI (DK-QSI)

Bind ML-DSA-87 (signing) and ML-KEM-1024 (encryption) into a single on-chain identity. Enables private batch participation and threshold cryptography.

Signing Authority:ML-DSA-87 for receipts & proofs
Decryption Authority:ML-KEM-1024 for private batches
Cryptographic Binding:Both keys bound to single DID
$ anubis-notary anchor neo identity register-dual

[+] Generating ML-DSA-87 keypair...

[+] Generating ML-KEM-1024 keypair...

[+] Binding keys with signature...

[+] DK-QSI ID: ML-DSA-87:ML-KEM-1024:<fp>

[+] Registering on Neo N3 TestNet...

[✓] Identity anchored (TX: 0xabc...)

PRIVATE BATCH PROTOCOL

Multiple parties contribute receipts without revealing data. Uses Shamir Secret Sharingand threshold decryption (t-of-n recovery).

1. Create collaborative batch
2. Each party submits encrypted share
3. Anchor batch root to Neo N3
4. Threshold recovery (t parties)

NEO NAME SERVICE (NNS)

Resolve human-readable .neo domains to addresses, contract hashes, or NeoFS CIDs.

$ anubis-notary anchor neo nns-resolve alice.neo
Address: NbWpv2WLyyqXz4Y5T5uzMgfdsaZSzxsC2S
NeoFS CID: bafybeigdyrzt5...

SMART CONTRACT FUNCTIONS

NotaryOracleV2 contract on Neo N3 TestNet: 0xff099c61be9e5b0e1fbcfa9a785e39282adb4057

ANCHORING FUNCTIONS

AnchorRoot(root)
Anchor single SHA-512 Merkle root (64 bytes)
AnchorBatch(roots[])
Anchor up to 8 roots in one TX (8x cost savings)
IsAnchored(root)
Check if root exists on-chain

IDENTITY FUNCTIONS

RegisterDualKeyIdentity
Register ML-DSA-87 + ML-KEM-1024 bound identity
RotateKey
Rotate to new key maintaining continuity
ResolveCTA
Lookup Cryptographic Threshold Authority

NEOFS COMMANDS

Container Management
anubis-notary anchor neo neofs-create --name "receipts"
S3 Gateway (large files)
anubis-notary anchor neo s3-store <FILE> --encrypt
Authentication
anubis-notary anchor neo neofs-auth

BATCH QUEUE SYSTEM

Queue receipts locally, submit as single transaction for 8x cost reduction.

$ anubis-notary anchor neo queue receipt.anb
[+] Queued (1 of 8)
$ anubis-notary anchor neo flush --force
[✓] Batch anchored (0.15 GAS for 8 receipts)

CRYPTOGRAPHIC THRESHOLD AUTHORITY (CTA)

Your ML-KEM-1024 decryption fingerprint becomes your CTA, enabling threshold cryptography and reverse identity lookup.

# Find owner of decryption key
$ anubis-notary anchor neo identity resolve-cta <fp>
Signing FP: abc123...
Status: Active

WALLET INTEGRATION

Key Formats
WIFKzAhz8gANe8pdy...
AddressNbWpv2WLyyqXz...
NEO_PRIVATE_KEY=<WIF>
NEO_RPC_URL=<URL>
ANUBIS_PASSWORD=<PASS>

COMPLETE WORKFLOW

# 1. Register DK-QSI Identity
$ anubis-notary anchor neo identity register-dual --name "Alice"
[✓] DK-QSI registered
# 2. Sign document
$ anubis-notary sign document.pdf --out document.sig
# 3. Create receipt
$ anubis-notary attest document.pdf --receipt document.anb
# 4. Create NeoFS container
$ anubis-notary anchor neo neofs-create --name "anubis-test"
[+] Container: bafybei...
# 5. Encrypt & upload to NeoFS
$ anubis-notary anchor neo neofs-store document.pdf --encrypt
[✓] Encrypted with ML-KEM-1024
# 6. Anchor to Neo N3
$ anubis-notary anchor neo anchor document.anb
[✓] Anchored (Block: 245,102)

LIVE NEO N3 ANCHORS

TestNet

No recent anchor activity

Scanning last 200 blocks on TestNet

Contract: 0x4f3472...9c013aView Contract

MERKLE WITNESS GENERATION

Batch anchoring creates a Merkle tree structure, allowing independent verification of individual receipts without revealing the entire batch. Each receipt includes a Merkle witness (proof path) for cryptographic verification.

# Generate batch with Merkle tree

$ anubis-notary anchor neo batch \

doc1.pdf doc2.pdf doc3.pdf

[+] Computing Merkle root...

[+] Generating witnesses...

[✓] Batch anchored (ID: 42)

# Verify with Merkle witness

$ anubis-notary verify doc1.anb

[+] Verifying Merkle proof...

[+] Root: 0xabc123...

[+] Witness path: [0x1, 0x2]

[✓] Valid (Block: 245,102)

NEOFS ADVANCED FEATURES

S3 GATEWAY (UP TO 5GB)

AWS S3-compatible API with multipart uploads, parallel streams (4 concurrent), and resume support for interrupted transfers.

$ anubis-notary neofs s3-upload \

large-file.zip --multipart

[+] Uploading in 4 streams...

CHUNKED MANIFESTS (>20MB)

Automatic 16MB chunk splitting for large files with JSON manifest tracking all chunk CIDs for reassembly.

$ anubis-notary neofs upload \

video.mp4 --chunked

[+] Split into 5 chunks

BEARER TOKEN AUTH

Two signing schemes: WalletConnect (80-byte with salt) and NeoFS Standard (65-byte with 0x04 prefix).

WalletConnect: [32B salt || 48B sig]

NeoFS Std: [0x04 || 64B sig]

CONTAINER MANAGEMENT

Create containers with placement policies and GAS deposits for decentralized storage quotas.

$ anubis-notary neofs container \

create --deposit 10

SECURITY FEATURES

TIMING ATTACK PROTECTION

Constant-time operations prevent side-channel leakage of secret keys:

result = a.len ^ b.len

for i in 0..min_len:

result |= a[i] ^ b[i]

return result == 0

MEMORY DISCLOSURE PROTECTION

Automatic zeroization of sensitive data on drop prevents memory scraping attacks:

impl Drop for SecretKey {

fn drop(&mut self) {

self.bytes.zeroize();

}

}

REPLAY ATTACK PROTECTION

Timestamps and deterministic nonces prevent replay of signed documents:

nonce = SHAKE256(

key_id ||

counter ||

timestamp

)

HSM SUPPORT

PKCS#11 integration for hardware security modules in enterprise environments:

$ anubis-notary key init \

--hsm-module /usr/lib/pkcs11.so \

--hsm-slot 0

RATE LIMITING

Per-caller, per-block limits prevent DoS attacks (~15s reset):

Anchoring10/block
Identity Reg5/block
Collab Batch3/block

FRONT-RUNNING PROTECTION

Signature commitments prove key ownership before registration:

commitment = SHA-256(

domain_tag ||

fingerprint ||

tx.Sender

)

GAS COST BREAKDOWN

OPERATIONCOST (GAS)USD @ $10/GAS
Single Anchor~0.01$0.10
Batch Anchor (8 roots)~0.012$0.12
Register Identity~0.02$0.20
Register Dual-Key Identity~0.025$0.25
Create Collaborative Batch~0.03$0.30
Submit Share~0.01$0.10

IDENTITY LIFECYCLE & W3C DID

STATE TRANSITIONS

CREATED
ACTIVE
REVOKED / ROTATED

Key rotation creates chains: fp1 → fp2 → fp3. All old fingerprints resolve to the latest active key.

W3C DID FORMAT

did:anubis:neo:testnet:<fingerprint>

did: W3C DID scheme

anubis: Method name

neo: Blockchain

testnet: Network

<fp>: SHA-512 fingerprint

$ anubis-notary neo identity resolve \

did:anubis:neo:testnet:abc123...

[✓] Status: ACTIVE

ON-CHAIN EVENTS

Subscribe to real-time Neo N3 events emitted by the NotaryOracleV2 smart contract for monitoring and automation.

EVENTPARAMETERSDESCRIPTION
RootAnchoredanchorId, root, blockHeight, txHashSingle root anchored
BatchAnchoredanchorIds[], roots[]Batch of roots anchored
IdentityRegisteredfingerprint, blockHeightNew QSI identity
IdentityRevokedfingerprint, reasonIdentity revoked
IdentityRotatedoldFp, newFpKey rotation
DualKeyIdentityRegisteredsigningFp, decryptionFp, blockHeightNew DK-QSI
CollaborativeBatchCreatedbatchId, threshold, total, participants[]New batch
BatchDecryptablebatchId, currentShares, thresholdThreshold reached

WALLET MANAGEMENT

Create, import, and manage Neo N3 wallets with balance checking and GAS management.

$ anubis-notary neo wallet create

$ anubis-notary neo wallet address

$ anubis-notary neo wallet balance

[✓] Balance: 10.5 GAS

NEO NAME SERVICE (NNS)

Resolve human-readable .neo domains to Neo addresses and vice versa.

$ anubis-notary neo nns-resolve

example.neo

[✓] Address: NXabc...

$ anubis-notary neo nns-reverse

NXabc...

[✓] Domain: example.neo

CNSA 2.0 COMPLIANT

Meets NSA's Commercial National Security Algorithm Suite 2.0 requirements for post-quantum cryptography.ML-DSA-87, ML-KEM-1024,SHA-512, and ChaCha20Poly1305provide defense-grade security.

INSTALLATION

QUICK INSTALL (LINUX/MACOS)

curl -LO https://github.com/AnubisQuantumCipher/anubis-notary/releases/download/v0.4.2/anubis-notary-linux-x86_64 && 
chmod +x anubis-notary-linux-x86_64 &&
./anubis-notary-linux-x86_64 --version

SUPPORTED PLATFORMS

  • Linux (x86_64, ARM64)v0.4.2
  • macOS (Intel, Apple Silicon)v0.4.2
  • Windows (x86_64)v0.4.2

BUILD FROM SOURCE

Requires Rust 1.75+ and Cargo.

cargo install --git https://github.com/AnubisQuantumCipher/anubis-notary

FILE ENCRYPTION

Encrypt files for yourself or a single recipient using post-quantum ML-KEM-1024 key encapsulation with ChaCha20Poly1305 symmetric encryption.

# Generate ML-KEM-1024 keypair

$ anubis-notary private-batch keygen --out mykey

# Seal (encrypt) a file

$ anubis-notary seal document.pdf --recipient mykey.mlkem.pub --out document.sealed

# Unseal (decrypt) with secret key

$ anubis-notary unseal document.sealed --secret-key mykey.mlkem.sec --out document.pdf

Sealed File Format:Magic (4B) + ML-KEM Ciphertext (1568B) + Nonce (12B) + Encrypted Data + Auth Tag (16B)
Security:NIST Level 5 post-quantum security. Only the holder of the corresponding secret key can unseal.

STREAMING OPERATIONS

Process large files efficiently with streaming operations. Hash, sign, and verify multi-gigabyte files without loading them entirely into memory.

# Hash large files efficiently

$ anubis-notary stream hash large-file.iso

# Stream sign

$ anubis-notary stream sign large-file.iso -o large-file.sig

# Stream verify

$ anubis-notary stream verify --sig large-file.sig large-file.iso

Memory Efficient:Process files of any size with constant memory usage
Use Cases:ISOs, archives, video files, database dumps, VM images
M

MULTI-SIGNATURE GOVERNANCE

Implement t-of-n threshold governance for critical operations. Require multiple parties to approve actions before execution.

# Initialize 2-of-3 multisig

$ anubis-notary multisig init --threshold 2 \

--signers signer1.pub,signer2.pub,signer3.pub \

-o multisig.config

# Create proposal

$ anubis-notary multisig propose --config multisig.config \

--proposal-type authorize-action --data <hex> -o proposal.bin

# Sign proposal

$ anubis-notary multisig sign --config multisig.config \

--proposal proposal.bin

# Execute when threshold met

$ anubis-notary multisig execute --config multisig.config \

--proposal proposal.bin

Threshold
t-of-n signature requirement
Proposals
Authorize actions, policy changes

KEY ROTATION

Rotate signing keys while maintaining identity continuity. Archive old keys securely and revoke compromised keys with cryptographic proofs.

# Rotate keys (archives old key)

$ anubis-notary key rotate

# Revoke a key

$ anubis-notary key revoke <fingerprint> \

--reason "key compromised"

# List archived and revoked keys

$ anubis-notary key list

# Show current key

$ anubis-notary key show

Identity Continuity:Maintain identity across key rotations
Secure Archival:Old keys archived with timestamps
Revocation Proofs:Cryptographic proof of key revocation

LEGAL DOCUMENT ECOSYSTEM

Beyond simple document signing. A complete legal infrastructure for the quantum age.

💍

MARRIAGE

Blockchain-anchored marriage contracts with NFT rings. Supports monogamy and polygamy templates.

$ anubis marriage create

$ anubis marriage add-party

$ anubis marriage sign

$ anubis marriage anchor

$ anubis rings mint

📜

WILLS

Quantum-secure wills with witness signatures, codicils, and revocation. Tamper-evident storage.

$ anubis will create

$ anubis will add-witness

$ anubis will add-codicil

$ anubis will sign

$ anubis will revoke

🏠

DEEDS

Property deeds with chain of title tracking. Transfer ownership with cryptographic proof.

$ anubis deed create

$ anubis deed transfer

$ anubis deed history

$ anubis deed verify

$ anubis deed anchor

📋

CONTRACTS

Business contracts with amendments, multi-party signatures, and version history.

$ anubis contract create

$ anubis contract add-party

$ anubis contract amend

$ anubis contract sign

$ anubis contract anchor

📖

JOURNALS

Tamper-evident notary journals. Export to PDF, CSV, JSON. Batch anchor entries.

$ anubis journal create

$ anubis journal add-entry

$ anubis journal export --pdf

$ anubis journal anchor

$ anubis journal verify

🔑

LICENSES

Cryptographic software licenses with expiration, feature flags, and revocation.

$ anubis license issue

$ anubis license verify

$ anubis license revoke

$ anubis license list

$ anubis license export

BACKEND READY

DATA MARKETPLACE

Sell sealed data on-chain with post-quantum encryption. Two-phase delivery prevents front-running. ML-KEM-1024 key exchange ensures only buyers can decrypt purchased content.

  • List Sealed DataEncrypt and list data for sale with price in GAS.
  • Two-Phase DeliveryBuyer pays, seller delivers key, prevents front-running.
  • Revenue ClaimsSellers claim accumulated revenue from all sales.
MARKETPLACE_API.RS
// Backend functions (neo.rs)

list_sealed_data(price, neofs_cid, metadata)

purchase_access(listing_id, buyer_pk)

deliver_access(purchase_id, encrypted_key)

claim_revenue(seller_address)

get_listing(listing_id)

get_purchase(purchase_id)

get_pending_deliveries(seller)

STATUS: BACKEND COMPLETE · CLI COMING SOON