Security that adapts
to the future.
Not guesses at it.

"Quantum-Proof" is a guess. "Zero-Persistence" is a certainty.

Current "quantum-proof" algorithms are still based on computational hardness, guesses at what future computers can't do. Phantom Secrets™ relies on Information-Theoretic Security. By using ZSS to ensure that fewer than the required quorum of shares provides zero information about the secret, we provide a mathematical barrier that is inherently resistant to quantum brute-force.

Quantum computing breaks a core assumption in cryptography.

That today's keys will remain secure tomorrow.

Most systems respond by replacing algorithms, increasing complexity, and adding overhead, but they ignore a more fundamental issue: they still rely on stored secrets.

If those secrets are ever exposed later, they can be broken retrospectively.

Upgrading algorithms requires reissuing and migrating keys across the entire system.

Systems become rigid and expensive to evolve as cryptographic standards advance.

Lokblok doesn't start with algorithms. It starts with eliminating persistent keys.

With Phantom Secrets™, there is no stored key to harvest, ever.

Keys are never stored
Keys are reconstructed only when needed
Keys exist only in secure memory
Keys are destroyed immediately after use

This dramatically reduces long-term exposure, regardless of the algorithm used.

Quantum resistance isn't one thing. It depends on the secret.

Security is only as strong as the weakest component. If the underlying key, for example Bitcoin's secp256k1, is not quantum-resistant, wrapping it in quantum-resistant protocols doesn't make it safe. An attacker will simply target the key itself.

Blindly applying "post-quantum" cryptography everywhere is often:

  • Inefficient
  • Expensive
  • Pointless

Smart Security, Not Overkill

Lokblok uses fit-for-purpose cryptography based on what the key itself requires, not a one-size-fits-all assumption.

For non-quantum-resistant keys

e.g. today's blockchain systems

Efficient classical algorithms (e.g. ECDH)
Reduced overhead
Strong practical security via threshold + distribution

For quantum-resistant systems

e.g. future cryptographic standards

Post-quantum algorithms (e.g. NTRU, SABER)
End-to-end quantum-resistant workflows

This is the real advantage.

Most systems are locked into one cryptographic stack. Lokblok isn't. Phantom Secrets is designed to swap cryptographic components without redesigning the system.

Key agreement algorithms can evolve

From ECDH today to NTRU or SABER tomorrow, or whatever standard NIST adopts next. The system adapts without architectural changes.

Security models can adapt

As the threat landscape changes, including quantum maturity, new attack vectors, and regulatory shifts, the cryptographic approach updates independently of the rest of the system.

New standards can be adopted

NIST post-quantum standardisation is still evolving. Algorithm agility means you don't need to bet on a single outcome.

Without rebuilding infrastructure

No key migrations. No re-architecture. No forced system redesigns. The underlying security model stays intact while the cryptographic layer evolves.

Phantom Secrets separates two critical functions.

1. Key Agreement

Flexible

ECDH Efficient, classical, ideal for today's non-QR key types
NTRU / SABER Post-quantum key agreement for future-proof workflows
Future algorithms Pluggable architecture accommodates standards as they emerge

2. Secret Splitting

Future-proof

Shamir's Secret Sharing Information-theoretic security, not dependent on computational hardness assumptions
No dependency on computational hardness Unlike RSA or ECC, Shamir's security holds regardless of computing power

This separation allows:

Performance optimisation today
Quantum resistance tomorrow
No architectural redesign required

Four "no's" that change your security posture permanently.

No historical key exposure

There is no stored key database to decrypt later. Harvest-now-decrypt-later attacks find nothing to harvest.

No forced migration cycles

You don't need to rotate or reissue stored keys when standards change. There are no stored keys to migrate.

No wasted complexity

You don't apply quantum-resistant algorithms where they add no value. Fit-for-purpose cryptography reduces cost and overhead.

No lock-in

Your security evolves with the cryptographic landscape. Algorithm agility means you're never dependent on a single standard.

Long-term security, built in from the start.

Long-term security for digital assets

No stored key means no exposure window, now or in the future.

Future-proof enterprise infrastructure

Algorithm agility means your stack doesn't become obsolete as standards change.

Regulatory adaptability

As post-quantum compliance requirements evolve, your architecture can respond without rebuilding.

Efficient performance in constrained environments

Fit-for-purpose cryptography means you're not paying the cost of post-quantum overhead where it isn't needed, including JavaCard and mobile SEs.

Technical White Paper: Quantum Resistance Architecture

Algorithm agility design, Phantom Secrets separation of key agreement and secret splitting, and guidance for integrating with existing enterprise systems.

Request White Paper

When the algorithms change,
you won't need to.

No persistent secrets. No algorithm lock-in. No unnecessary overhead. Just a system that adapts as cryptography evolves.