Keys without key risk.

Phantom Secrets™ eliminates stored secrets entirely. No keys at rest. No shares to steal. No recovery backdoors. Secrets are reconstructed only when needed, inside secure hardware, then destroyed immediately.

Every security system fails at the same point: where secrets exist over time.

  • Stored keys become attack targets
  • Backups become liabilities
  • Recovery introduces trust
  • MPC shares can be accumulated
  • Even "secure" systems still rely on something existing somewhere

Phantom Secrets™ replaces storage with ephemeral reconstruction.

Traditional approach

  • Private keys stored
  • Encrypted backups required
  • Persistent key shares
  • Custodial exposure

Phantom Secrets™ approach

  • Public Regen Tokens stored (safe, useless on their own)
  • A quorum of participants authorizes reconstruction
  • The key is rebuilt inside secure hardware (Toughkey™)
  • Used once, immediately destroyed
  • The secret exists only at the moment of use

From reconstruction to destruction in a single operation.

1

Regen Tokens Published

Public, non-sensitive tokens are stored. They are cryptographically useless without the quorum.

2

Conditions Evaluated

Identity is verified via ToughID™. Policy conditions are checked. Quorum threshold determined.

3

Quorum Convened

The required number of independent participants authorize the reconstruction event.

4

Key Reconstructed in Hardware

Inside certified secure hardware (Toughkey™), the key is mathematically reconstructed. It never leaves the secure element.

5

Operation & Destruction

The signing or decryption operation completes. The key is immediately destroyed. Nothing persists.

No persistent attack surface. No latent secret. No custody model.

No Persistent Attack Surface

There is nothing to steal at rest. The moment that creates all others, storing a key, is simply never performed.

No Latent Secret

No stored artifact reduces entropy or enables offline attack. Even if every Regen Token is compromised, the key cannot be reconstructed without the quorum.

No Custody Model

No one holds a key. Not even Lokblok®. Custody is replaced by quorum governance.

Threshold-Based Recovery

Flexible k-of-n threshold schemes. You define how many participants must agree. One compromised participant cannot act alone.

Hardware-Bound Execution

Toughkey™ certified secure enclave ensures the key is reconstructed in protected memory and never exposed to any software layer.

Policy-Controlled Access

Access requires conditions to be satisfied, not just possession of a credential. Cryptographic policy enforcement, not perimeter defense.

Phantom Secrets™ vs. existing approaches

ApproachKeys at RestSingle Point of FailureStolen if Vault BreachedEphemeral Keys
Cold Storage
HSM
MPC / TSSSharesPartialPossible
Password Manager / Vault
Phantom Secrets™

= Vulnerability exists. = Not applicable / no vulnerability.

Lokblok® Zero Trust Ecosystem architecture overview

Phantom Secrets™ is the foundation.

Every other Lokblok® product builds on top of Phantom Secrets to deliver a complete zero-trust cryptographic architecture.

If the key doesn't exist, it can't be stolen.

Ready to eliminate your key storage attack surface?