Glossary

The language of secrets that don't exist. Each term links to its own page with related concepts and references.

All terms (A–Z)

B

E

  • EphemeralThe property of a regenerated secret. It exists only for the briefest moment to perform its task, then is immediately destroyed — leaving…

H

  • Hierarchical SignaturesAn extension of MPC/TSS that enforces real-world business logic in the cryptography itself. Instead of simple thresholds (e.g. 'any 2 of …

L

  • LokboxLokblok's secure cloud storage system (formerly Toughcloud) that shards and encrypts data across decentralised storage providers, with th…

M

  • MiddlewareIn Lokblok, middleware refers to two related layers. First, Lokblok's platform role: operating as an invisible, cloud-based security laye…
  • Multi-Party Computation (MPC)A cryptographic process where multiple parties jointly compute on a secret without any one party seeing the whole secret. In Phantom Secr…

P

  • Phantom Gate™A stealth-mode access service formerly called Phantom Secrets Knock Knock Protocol. Keeps applications and servers invisible until an aut…
  • PhantomizingThe full process of converting a persistent secret into a phantom secret that never exists at rest. Secrets are destroyed and only regene…

R

  • Regen TokensA step within phantomizing where encrypted secret shards are replaced with harmless Regen Tokens. These act like signposts — pointing to …

S

T

  • Threshold Secret Sharing (TSShr)The foundational method of splitting a secret into multiple parts (shares), where only a defined threshold (e.g. 2 of 3) can reconstitute…
  • Threshold Signature Scheme (TSSig)A form of MPC where the private key is never reconstructed at all. Instead, each participant produces a partial signature, and these are …
  • ToughID™A Lokblok identity specification that orchestrates KYC, verification, and recovery processes across multiple parties, using tokenised dat…
  • Toughkey™Certified hardware (FIPS / Common Criteria smartcard or USB form factor) that anchors Phantom Secrets in a tamper-resistant environment. …

Z

  • Zero TrustThe principle 'Never Trust, Always Verify.' Lokblok applies this to every layer: users, devices, networks, applications, and secrets. Not…

By category

Phantom Secrets™

Secure Terminal™

Standalone / Infrastructure

Core Principles