Goal: define a stable cryptographic root for each identity that:


1. Identity Object (conceptual)

2. Identity State Fields

3. Commitment Equation

4. Sub-Commitments

5. State Evolution (Commitment Chain)

6. What Goes On-Chain vs Off-Chain

7. Security Properties (what this design guarantees)

8. Minimal “Create Identity” Flow