Getting Started
description: An overview of S.I.G.N. and the underlying systems that power sovereign digital infrastructure.
S.I.G.N.
Use Cases
Getting Started with S.I.G.N.
Introduction
S.I.G.N. is sovereign-grade digital infrastructure designed to support national-scale systems for money, identity, and capital.
Modern government and regulated financial systems increasingly rely on digital execution: CBDCs, regulated stablecoins, national ID systems, subsidy distribution, and tokenized real-world assets (RWA). While these systems appear different on the surface, they all depend on the same foundational requirements:
Verifiable identity and eligibility
Programmable execution rules
Durable, inspectable records
Interoperability across chains and systems
Auditability without sacrificing privacy
S.I.G.N. provides a unified infrastructure layer that addresses these requirements through three interoperable systems.
The Three Systems of S.I.G.N.
New Money System
The New Money System enables CBDCs and regulated stablecoins to operate on both public and private blockchains with policy controls, auditability, and interoperability.
It supports:
Public-chain deployments (L1/L2) for transparency and composability
Private-chain deployments (e.g. Fabric-based CBDC rails) for confidentiality
Bridging between public and private money systems
Identity-bound and policy-constrained execution
New ID System
The New ID System provides national digital identity and verifiable credentials using open standards.
It enables:
W3C Verifiable Credentials (VC) and DIDs
Selective disclosure and privacy-preserving proofs
Cross-agency and cross-platform verification
Trust registries and revocation mechanisms
New Capital System
The New Capital System supports tokenized real-world assets (RWA) and programmable capital distribution.
It enables:
Large-scale allocation and distribution (grants, subsidies, incentives)
Compliance-aware transfers and vesting
Identity-gated participation
Real-time reporting and audit trails
The Trust and Evidence Layer (Where Sign Protocol Fits)
All three systems rely on a shared trust and evidence layer to record, verify, and query structured claims over time.
This layer is implemented by Sign Protocol.
Sign Protocol is an omni-chain attestation protocol that allows systems to define schemas and deposit verifiable data—called attestations—on-chain or via decentralized storage, while remaining easily discoverable and queryable.
Without a shared trust layer like Sign Protocol, digital systems face the same fragmentation problems:
Data is scattered across contracts, chains, and storage systems.
Developers must reverse-engineer contract interfaces and data layouts.
Historical state changes are difficult to track consistently.
Indexing requires bespoke infrastructure for each application.
Auditing and inspection become manual and error-prone.
Sign Protocol solves this by standardizing how structured data is defined, written, linked, and queried.
How Sign Protocol Works
Sign Protocol is composed of several interoperable components.
Writing Data
Sign Protocol organizes data into two core primitives:
Schemas — structured templates defining data formats
Attestations — signed instances of schema-conformant data
Data can be written using three storage models:
Fully on-chain (EVM, Starknet, Solana, TON)
Fully Arweave
Hybrid (on-chain references + off-chain payloads)
Fully on-chain and hybrid transactions can be initiated directly. Fully Arweave transactions are initiated through the Sign Protocol API. Once finalized, SignScan automatically indexes the data.
Reading Data
Data can be retrieved in two primary ways:
Direct reads from smart contracts and Arweave Suitable for low-level access, but limited in filtering and aggregation.
SignScan APIs SignScan is Sign’s indexing and aggregation service, providing REST and GraphQL APIs that unify data across all supported chains. It also powers the public explorer at https://scan.sign.global.
This architecture allows developers, auditors, and operators to focus on system logic rather than data plumbing.
How This Enables Sovereign Systems
By combining:
standardized attestations (Sign Protocol),
identity-bound credentials (New ID),
programmable execution (New Money, New Capital),
S.I.G.N. enables governments and regulated institutions to build systems that are:
Privacy-preserving to the public
Inspectable by authorized parties
Composable across programs
Auditable by design
What’s Next?
Depending on your role:
Builders can dive deeper into:
Sign Protocol smart contracts
SDKs and APIs
Indexing and querying
System designers can explore:
Use cases for Money, ID, and Capital
Reference architectures
Governance and deployment models
Continue to:
Sign Protocol Documentation
Use Case Guides
Integration Tutorials
Last updated
Was this helpful?
