# Overview

CEVEX is post-quantum cryptographic identity infrastructure for autonomous AI agents. The protocol solves a coordination problem that emerges as machine economies proliferate beyond the reach of human supervision: how does any participant in a decentralized network verify that an action was performed by the agent it claims to originate from, without relying on a trusted intermediary, and without cryptographic assumptions that quantum hardware will soon invalidate?

***

## The Problem

Classical public key infrastructure rests on computational hardness assumptions. RSA relies on the difficulty of factoring large integers. ECDSA relies on the discrete logarithm problem over elliptic curves. A sufficiently powerful fault-tolerant quantum computer running Shor's algorithm solves both in polynomial time, collapsing the security of the entire classical identity stack.

For autonomous agent infrastructure, the threat is operational: compromised identity means unauthorized agents can execute transactions, accumulate resources, or trigger irreversible protocol decisions while appearing legitimate.

***

## The CEVEX Approach

```mermaid
%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#003399', 'primaryTextColor': '#eff6ff', 'primaryBorderColor': '#1a7fff', 'lineColor': '#3d8bff', 'secondaryColor': '#001650', 'tertiaryColor': '#000d20', 'clusterBkg': '#001650', 'titleColor': '#eff6ff', 'edgeLabelBackground': '#001650'}}}%%
graph LR
    A["Classical PKI\nComputational hardness\nBreakable by Shor's"] -->|replaced by| B["CEVEX Layer 1\nHardware QRNG\nPhysical unforgeability"]
    B --> C["CEVEX Layer 2\nLattice Signatures\nPost-quantum unforgeability"]
    C --> D["CEVEX Layer 3\nOn-Chain Registry\nTrustless verification"]

    style A fill:#001650,color:#7dd3fc,stroke:#3d8bff
    style B fill:#003399,color:#eff6ff,stroke:#1a7fff
    style C fill:#003399,color:#eff6ff,stroke:#1a7fff
    style D fill:#003399,color:#eff6ff,stroke:#1a7fff
```

CEVEX constructs a three-layer response.

**Layer 1: Physical Entropy.** Keys are derived from hardware quantum random number generation. Quantum measurement events are nondeterministic by physical law. An adversary with unbounded computational resources cannot predict or reproduce the entropy used to generate a CEVEX identity. This means identity uniqueness is bounded by physics, not mathematics.

**Layer 2: Post-Quantum Lattice Signatures.** Agent operations are authenticated using CRYSTALS-Dilithium today. The FALCON interface is reserved as the secondary NIST scheme for the audited release path. Security reduces to the hardness of Module LWE for the active signing path and NTRU lattice problems for the reserved secondary path.

**Layer 3: Decentralized On-Chain Registry.** Agent public keys are designed to be registered on Base through an append-only identity contract with Ethereum-secured finality. No certificate authority. No trusted third party. Any participant can verify implemented signatures through direct lattice arithmetic.

***

## Protocol Lifecycle

```mermaid
%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#003399', 'primaryTextColor': '#eff6ff', 'primaryBorderColor': '#1a7fff', 'lineColor': '#3d8bff', 'secondaryColor': '#001650', 'tertiaryColor': '#000d20', 'actorBkg': '#003399', 'actorBorder': '#1a7fff', 'actorTextColor': '#eff6ff', 'actorLineColor': '#3d8bff', 'signalColor': '#7dd3fc', 'signalTextColor': '#eff6ff', 'labelBoxBkgColor': '#001650', 'labelBoxBorderColor': '#1a7fff', 'labelTextColor': '#eff6ff', 'noteBorderColor': '#1a7fff', 'noteBkgColor': '#001650', 'noteTextColor': '#eff6ff', 'activationBorderColor': '#1a7fff', 'activationBkgColor': '#003399'}}}%%
sequenceDiagram
    participant Q as QRNG
    participant K as Key Derivation
    participant R as Base Registry
    participant A as Agent
    participant V as Verifier

    Q->>K: Quantum entropy seed
    K->>K: Derive keypair (sk, pk)
    K->>R: Register pk on Base
    K->>A: Deliver sk securely

    Note over A,V: Agent is now active and globally verifiable

    A->>A: Sign action with sk
    A->>V: Broadcast (action, signature)
    V->>R: Resolve pk for agent address
    V->>V: Verify signature via lattice arithmetic
    V-->>A: Accept or reject (no CA involved)
```

***

## Design Principles

**Physical unforgeability over algorithmic hardness.** Where possible, CEVEX replaces computational assumptions with physical guarantees. Quantum entropy is not assumed to be hard to predict, it is physically impossible to predict.

**No trust anchors.** Certificate authorities, OCSP responders, and trust anchors are single points of compromise that CEVEX eliminates by construction. Verification requires only public data and local computation.

**Long-horizon security.** Parameter sets are selected to maintain security through the 2080 cryptographic horizon based on NIST projections for fault-tolerant quantum hardware and lattice hardness estimates.

**Composability.** CEVEX signatures are standalone cryptographic artifacts. They can be embedded in zero-knowledge proofs, included in batch verification pipelines, or anchored to any EVM-compatible chain without modification to the core protocol.

***

## Relationship to Existing Standards

| Standard        | Role in CEVEX                        |
| --------------- | ------------------------------------ |
| NIST FIPS 204   | Dilithium signing scheme             |
| NIST FIPS 206   | FALCON reserved secondary scheme     |
| NIST SP 800-90B | Entropy source requirements for QRNG |
| NIST SP 800-208 | Key derivation guidance              |

***

## Next Steps

* [Key Generation](/the-protocol/key-generation.md)
* [Post-Quantum Signatures](/the-protocol/signatures.md)
* [Trustless Verification](/the-protocol/verification.md)
* [On-Chain Registry](/the-protocol/on-chain-registry.md)
* [Security Model](/security/security-model.md)
* [Cryptographic Primitives](/security/cryptographic-primitives.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.cevex.io/the-protocol/overview.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
