The first blockchain certificate system to implement the standard Java java.security.cert.Certificate interface making Shamwari certificates natively interoperable with any JVM-based PKI infrastructure, signed with NIST-standard Dilithium, revocable at the next block.
ShamwariCertificate extends java.security.cert.Certificate directly. Any JVM application that accepts standard certificates e.g web servers, payment terminals, enterprise middleware, accepts Shamwari certificates without modification, while gaining post-quantum security underneath.
Setting isGlobal = true makes a certificate valid and verifiable across all BetaChains simultaneously from a single issuance transaction on the CAPITAL chain. Chain-scoped certificates (isGlobal = false) are valid only on the issuing chain enabling jurisdiction-specific credentials alongside globally-valid identity certificates.
All certificate lifecycle operations are consensus transactions verifiable by any node, permanent in blockchain state, and effective at the next block confirmation.
Certificate issuance is restricted to organizations and authorised institutional account types. The protocol validates the issuer's account type at gate 4 (Account Type Gate) before any certificate is written to state.
Issues operating licences as on-chain certificates with block-height expiry. Licence status verifiable by any counterparty in real time with no third-party registry, no manual verification, no stale data risk.
Issues dealer licences, fund manager authorisations, and securities professional credentials. All credentials verifiable on-chain with Dilithium-signature proof of issuance.
DEVELOPER-type accounts can issue certificates for their applications in the App Store. Used for code signing, API access credentials, and application identity within the CAPITAL chain developer ecosystem.
Every use case benefits from instant on-chain revocation, global validity, JVM-native interface, and ML-DSA Dilithium signatures with zero migration effort for existing JVM infrastructure.
Any Java application that currently calls cert.verify(publicKey) works with ShamwariCertificate unchanged. The implementation handles Dilithium verification internally. Existing infrastructure requires zero modification to accept post-quantum certificates.
Traditional X.509 PKI infrastructure is built on ECDSA and RSA which are both vulnerable to Shor's algorithm on a quantum computer. Shamwari certificates deploy Dilithium from genesis with no migration path required.
| Property | Shamwari Certificate | X.509 / ECDSA |
|---|---|---|
| Signature algorithm | ML-DSA Dilithium (NIST FIPS 204) | ECDSA / RSA (quantum-vulnerable) |
| Quantum resistance | Full: lattice-based, no known quantum attack | Vulnerable to Shor's algorithm |
| JVM integration | Native java.security.cert.Certificate | Standard X.509 via JSSE/JCE |
| Revocation | Instant on-chain: in next block (~12s) | CRL (hours/days) or OCSP (polling) |
| Revocation infrastructure | Zero; blockchain state only | CRL servers, OCSP responders |
| Global validity | Single issuance, all chains | PKI hierarchy, multiple CAs |
| Expiry mechanism | Block height: deterministic, timezone-free | Calendar date: timezone, clock sync |
| Audit trail | Immutable blockchain state | CA logs, CT logs (optional) |
| Migration required | None: PQC from genesis | Full PKI migration required by 2030 |
Deploy post-quantum certificates for KYC credentials, institutional licences, node TLS, and code signing.