A clearing agency without a tamper-evident receipt is just a counterparty.
Onchain markets inherit four legacy roles — broker, dealer, exchange, clearing agency — and one missing primitive. Counterparties signed with ECDSA can settle a trade, but they cannot, after the fact, prove to a regulator, an auditor, or a court that the settlement record they hold has not been altered and was produced under a key the issuer controlled. The missing primitive is a dual-signed, post-quantum-ready receipt. Ed25519 today, ML-DSA-65 (NIST FIPS 204) after Q-day. Identifier resolved by did:hive. Settled in USDC on Base 8453.
Section 17A of the Exchange Act asked clearing agencies to be the trusted intermediary that records, confirms, and clears every trade. Onchain venues have moved settlement onto public chains but have not moved the receipt forward in cryptographic terms. ECDSA secp256k1 signatures secure the chain’s consensus; they are not a tamper-evident, regulator-grade receipt of who promised what to whom and when. Hive issues that receipt as a separate, neutral primitive that any venue, broker, or trust bank can adopt.
The four roles, mapped onchain
The U.S. securities-market role definitions still bind. Onchain venues do not escape them — they take them on. The grid below restates each legacy role, names the onchain delta, and identifies what Hive provides for that role.
Broker
Dealer
Exchange
Clearing agency
None of the four roles is replaced. Each is made cleanly auditable by the addition of a neutral receipt primitive that sits underneath whichever venue, wallet, or trust bank operates the role.
The Q-day gap
Today’s settlement records lean almost entirely on classical signatures — ECDSA secp256k1 on chain, RSA and ECDSA in the supporting infrastructure. Every one of those signatures has the same long-term property: a sufficiently capable quantum computer recovers the private key from the public key, and a once-valid signature becomes forgeable retroactively. NIST’s public timeline calls for federal deprecation of classical asymmetric cryptography by 2030 and disallowance by 2035 (NIST IR 8547). Conservative cryptographically relevant quantum computer (CRQC) roadmaps land inside that window. A receipt that can only be verified with ECDSA in 2031 is no receipt at all.
ECDSA signature ever produced under that key — including settlement attestations sealed years earlier — becomes indistinguishable from a forged one.The dual-signature design is not a hedge. It is the only construction that survives a future CRQC and a present-day classical attack on a poorly-implemented post-quantum library.
The receipt envelope
The shape below is a real Hive settlement receipt as a verifier renders it. The CBOR-canonical bytes are what travel between systems; the JSON view is for the human auditor. The signatures bind every field above them.
// CBOR-canonical envelope, JSON-rendered for review { "event": "trade_settled", "replay_id": "01J9C7H-TRADE-3F1A8E", "venue_did": "did:hive:venue:0x4b21…9d77", "buyer_did": "did:hive:org:0x71ab…d309", "seller_did": "did:hive:org:0xc0a4…112e", "instrument": "USDC/USD", "qty": 250000, "price": "1.00003", "settle_chain": "base:8453", "settle_currency": "USDC", "settle_tx": "0x9c1e…a4f2", "policy_hash": "sha256:7a1f9c…e3b2", "prior_attestation_id": "01J9C7H-MATCH-2D9B14", "timestamp": "2026-09-14T17:42:08Z", "sig_ed25519": "6f9b…c104", // RFC 8032 "sig_ml_dsa_65": "a3d2…81fe" // NIST FIPS 204 }
k1:8c2a…kq:b71d…did:hive:venue:… resolves · key history covers timestampFive fields carry the regulatory weight: replay_id is the unique identifier that prevents double-counting; venue_did, buyer_did, and seller_did bind the parties through did:hive; sig_ed25519 and sig_ml_dsa_65 are the dual signatures; timestamp is the canonical clock reference; settle_chain and settle_tx tie the receipt to the on-chain settlement of record.
Why did:hive
An identifier that resolves only inside one venue’s database is a counterparty identifier, not a market identifier. did:hive is a registered method under the W3C DID specification (DID 1.1), which means three things in practice.
- No central registry holds the resolution. Resolution proceeds from the DID document and its key history, both signed by the controller. Any verifier with the document and the issuer’s public keys completes resolution offline.
- It is not tied to a single VASP. A counterparty whose VASP relationship changes does not lose the identifier. Receipts issued under the prior controller key remain verifiable through the signed key-rotation chain.
- It binds the controller, not the address. Wallets can rotate. Custodians can change. Chains can fork. The DID continues to point to the controller of record, with full audit history of which keys were authoritative at which time.
For a regulator, this is the property that matters: the identifier on a receipt produced in 2026 still resolves correctly in 2031, even after every operational detail beneath it has changed.
Who this is for
This is a receipt primitive, infrastructure-neutral. It is offered to the regulators, auditors, and supervisory bodies whose mandates already require tamper-evident records of securities settlement, and to the operators those bodies supervise.
The receipt primitive is not the clearing agency. It is the artifact a clearing agency — whoever the SEC ultimately registers in that role for onchain markets — would issue at every state transition. The choice of operator is policy. The shape of the receipt is engineering.
A real conversation, not a demo black hole
If the receipt-primitive framing fits the way the Crypto Task Force, FINRA, or DTCC working groups are thinking about onchain market structure, the fastest path is a direct note. No qualification gate, no SDR. Steve reads them.