eERC — Encrypted ERC

Confidential ERC assets with selective disclosure

eERC brings privacy to ERC‑20 style assets on your Avalanche L1. Balances and transfer amounts are encrypted on‑chain while preserving auditability through viewing keys and attestation workflows.

How it works

Core components

Shielded notes: encrypted commitments represent balances
and transfer deltas.

Viewing keys: holders generate keys to decrypt their own
activity and share read access selectively.

Policy layer: precompiles enforce who can mint, transfer, or
view according to chain policy.

Transaction flow

  1. Create viewing keys and register optional recovery contacts.

  1. Wallet constructs an eERC transfer with encrypted amount
    and recipient note.

  1. Node verifies proofs and updates commitments; public receipt
    includes minimal metadata.

Visualize, configure, and audit with confidence

Key capabilities

Encrypted balances & transfers

Amounts and balances are hidden on‑chain using note commitments; public metadata remains minimal and policy‑driven.

Encrypted balances & transfers

Amounts and balances are hidden on‑chain using note commitments; public metadata remains minimal and policy‑driven.

Encrypted balances & transfers

Amounts and balances are hidden on‑chain using note commitments; public metadata remains minimal and policy‑driven.

Selective disclosure

Holders share viewing keys with auditors, partners, or regulators to prove holdings or activity without exposing all data.

Selective disclosure

Holders share viewing keys with auditors, partners, or regulators to prove holdings or activity without exposing all data.

Selective disclosure

Holders share viewing keys with auditors, partners, or regulators to prove holdings or activity without exposing all data.

Standards‑aligned

eERC mirrors familiar ERC‑20 semantics with additions for privacy, so existing tooling and mental models still apply.

Standards‑aligned

eERC mirrors familiar ERC‑20 semantics with additions for privacy, so existing tooling and mental models still apply.

Standards‑aligned

eERC mirrors familiar ERC‑20 semantics with additions for privacy, so existing tooling and mental models still apply.

Programmable policies

Chain admins can gate who can hold, transfer, or view assets and rotate keys as needed.

Programmable policies

Chain admins can gate who can hold, transfer, or view assets and rotate keys as needed.

Programmable policies

Chain admins can gate who can hold, transfer, or view assets and rotate keys as needed.

Compatibility

Works with AvaCloud Wallet‑as‑a‑Service, Gas Relayer, Web3 Data API, and private explorer modes.

Compatibility

Works with AvaCloud Wallet‑as‑a‑Service, Gas Relayer, Web3 Data API, and private explorer modes.

Compatibility

Works with AvaCloud Wallet‑as‑a‑Service, Gas Relayer, Web3 Data API, and private explorer modes.

Auditable by design

Event streams and proofs support internal controls, SOC 2 audits, and regulated use cases.

Auditable by design

Event streams and proofs support internal controls, SOC 2 audits, and regulated use cases.

Auditable by design

Event streams and proofs support internal controls, SOC 2 audits, and regulated use cases.

Integration

Wallet‑as‑a‑Service

Wallet‑as‑a‑Service

Wallet‑as‑a‑Service

Non‑custodial UX with secure viewing‑key storage and recovery.

Non‑custodial UX with secure viewing‑key storage and recovery.

Non‑custodial UX with secure viewing‑key storage and recovery.

Gas Relayer

Sponsor fees for private transfers and define policies.

Eliminate third-party bridge risk— teleporter and ICTT
rely on protocol-level security, not external validators.

Indexing & webhooks

Subscribe to viewable events for operations and compliance.

Plug into DEXs, CEXs, and partner ecosystems
without friction to import liquidity and users.

Evaluate eERC for your L1.

We’ll help you scope privacy requirements, rollout strategy, and disclosures for internal and external auditors.

Evaluate eERC
for your L1.

Partner with AvaCloud interoperability experts to design liquidity flows, bridge integrations, and monitoring strategies.

Evaluate eERC for your L1.

We’ll help you scope privacy requirements, rollout strategy, and disclosures for internal and external auditors.