Reference
Glossary
The language of secrets that don't exist. Each term links to its own page with related concepts and references.
All terms (A–Z)
B
- Business-Logic-Enforced CryptographyThe principle behind hierarchical signatures: organisational policies (who must sign, under what conditions) are not just workflow rules …
E
- EphemeralThe property of a regenerated secret. It exists only for the briefest moment to perform its task, then is immediately destroyed — leaving…
H
- Hierarchical SignaturesAn extension of MPC/TSS that enforces real-world business logic in the cryptography itself. Instead of simple thresholds (e.g. 'any 2 of …
L
- LokboxLokblok's secure cloud storage system (formerly Toughcloud) that shards and encrypts data across decentralised storage providers, with th…
M
- MiddlewareIn Lokblok, middleware refers to two related layers. First, Lokblok's platform role: operating as an invisible, cloud-based security laye…
- Multi-Party Computation (MPC)A cryptographic process where multiple parties jointly compute on a secret without any one party seeing the whole secret. In Phantom Secr…
P
- Phantom Gate™A stealth-mode access service formerly called Phantom Secrets Knock Knock Protocol. Keeps applications and servers invisible until an aut…
- PhantomizingThe full process of converting a persistent secret into a phantom secret that never exists at rest. Secrets are destroyed and only regene…
R
- Regen TokensA step within phantomizing where encrypted secret shards are replaced with harmless Regen Tokens. These act like signposts — pointing to …
S
- Secure Terminal™ Encrypted Local StorageComing SoonAn enhancement to Secure Terminal™ that allows encrypted files to be kept entirely local on the user's device instead of being pushed to …
T
- Threshold Secret Sharing (TSShr)The foundational method of splitting a secret into multiple parts (shares), where only a defined threshold (e.g. 2 of 3) can reconstitute…
- Threshold Signature Scheme (TSSig)A form of MPC where the private key is never reconstructed at all. Instead, each participant produces a partial signature, and these are …
- ToughID™A Lokblok identity specification that orchestrates KYC, verification, and recovery processes across multiple parties, using tokenised dat…
- Toughkey™Certified hardware (FIPS / Common Criteria smartcard or USB form factor) that anchors Phantom Secrets in a tamper-resistant environment. …
Z
- Zero TrustThe principle 'Never Trust, Always Verify.' Lokblok applies this to every layer: users, devices, networks, applications, and secrets. Not…