Feature
Security that adapts
to the future.
Not guesses at it.
"Quantum-Proof" is a guess. "Zero-Persistence" is a certainty.
Current "quantum-proof" algorithms are still based on computational hardness, guesses at what future computers can't do. Phantom Secrets™ relies on Information-Theoretic Security. By using ZSS to ensure that fewer than the required quorum of shares provides zero information about the secret, we provide a mathematical barrier that is inherently resistant to quantum brute-force.
The Problem
Quantum computing breaks a core assumption in cryptography.
That today's keys will remain secure tomorrow.
Most systems respond by replacing algorithms, increasing complexity, and adding overhead, but they ignore a more fundamental issue: they still rely on stored secrets.
The consequence
If those secrets are ever exposed later, they can be broken retrospectively.
Upgrading algorithms requires reissuing and migrating keys across the entire system.
Systems become rigid and expensive to evolve as cryptographic standards advance.
The Lokblok Approach
Lokblok doesn't start with algorithms. It starts with eliminating persistent keys.
With Phantom Secrets™, there is no stored key to harvest, ever.
This dramatically reduces long-term exposure, regardless of the algorithm used.
The Part Most People Miss
Quantum resistance isn't one thing. It depends on the secret.
Security is only as strong as the weakest component. If the underlying key, for example Bitcoin's secp256k1, is not quantum-resistant, wrapping it in quantum-resistant protocols doesn't make it safe. An attacker will simply target the key itself.
Blindly applying "post-quantum" cryptography everywhere is often:
- Inefficient
- Expensive
- Pointless
Smart Security, Not Overkill
Lokblok uses fit-for-purpose cryptography based on what the key itself requires, not a one-size-fits-all assumption.
For non-quantum-resistant keys
e.g. today's blockchain systems
For quantum-resistant systems
e.g. future cryptographic standards
Algorithm Agility
This is the real advantage.
Most systems are locked into one cryptographic stack. Lokblok isn't. Phantom Secrets is designed to swap cryptographic components without redesigning the system.
Key agreement algorithms can evolve
From ECDH today to NTRU or SABER tomorrow, or whatever standard NIST adopts next. The system adapts without architectural changes.
Security models can adapt
As the threat landscape changes, including quantum maturity, new attack vectors, and regulatory shifts, the cryptographic approach updates independently of the rest of the system.
New standards can be adopted
NIST post-quantum standardisation is still evolving. Algorithm agility means you don't need to bet on a single outcome.
Without rebuilding infrastructure
No key migrations. No re-architecture. No forced system redesigns. The underlying security model stays intact while the cryptographic layer evolves.
How It Works
Phantom Secrets separates two critical functions.
1. Key Agreement
Flexible
2. Secret Splitting
Future-proof
This separation allows:
Why This Matters
Four "no's" that change your security posture permanently.
No historical key exposure
There is no stored key database to decrypt later. Harvest-now-decrypt-later attacks find nothing to harvest.
No forced migration cycles
You don't need to rotate or reissue stored keys when standards change. There are no stored keys to migrate.
No wasted complexity
You don't apply quantum-resistant algorithms where they add no value. Fit-for-purpose cryptography reduces cost and overhead.
No lock-in
Your security evolves with the cryptographic landscape. Algorithm agility means you're never dependent on a single standard.
What This Enables
Long-term security, built in from the start.
Long-term security for digital assets
No stored key means no exposure window, now or in the future.
Future-proof enterprise infrastructure
Algorithm agility means your stack doesn't become obsolete as standards change.
Regulatory adaptability
As post-quantum compliance requirements evolve, your architecture can respond without rebuilding.
Efficient performance in constrained environments
Fit-for-purpose cryptography means you're not paying the cost of post-quantum overhead where it isn't needed, including JavaCard and mobile SEs.
Technical White Paper: Quantum Resistance Architecture
Algorithm agility design, Phantom Secrets separation of key agreement and secret splitting, and guidance for integrating with existing enterprise systems.
Request White Paper