# Business-Logic-Enforced Cryptography *Category: Phantom Secrets™.* The principle behind hierarchical signatures: organisational policies (who must sign, under what conditions) are not just workflow rules but cryptographically required. If the right people don't sign, the secret simply cannot be recovered. **Read more:** [/features/hierarchical-signatures](https://www.lokblok.co/features/hierarchical-signatures) ## Related terms in Phantom Secrets™ - [Phantomizing](https://www.lokblok.co/glossary/phantomizing) - [Regen Tokens](https://www.lokblok.co/glossary/regen-tokens) - [Ephemeral](https://www.lokblok.co/glossary/ephemeral) - [Toughkey™](https://www.lokblok.co/glossary/toughkey) - [Multi-Party Computation (MPC)](https://www.lokblok.co/glossary/multi-party-computation) - [Threshold Secret Sharing (TSShr)](https://www.lokblok.co/glossary/threshold-secret-sharing) - [Threshold Signature Scheme (TSSig)](https://www.lokblok.co/glossary/threshold-signature-scheme) - [Hierarchical Signatures](https://www.lokblok.co/glossary/hierarchical-signatures) [← Back to glossary](https://www.lokblok.co/glossary)