Threshold Cryptography Products For The Real World
Sepior has patented essential techniques to implement advanced threshold cryptographic solutions using multiparty computation (MPC) for emerging online services. The same underlying technology can be purposed to address a wide range of use cases and associated market needs.
Currently, Sepior offers the following threshold cryptography products:
Sepior™ Threshold KMS, Blockchain Privacy Control
Sepior™ ThresholdSig, Secure Wallet and Transaction (SWAT) Technology
Sepior™ Threshold KMaaS, White Label Service for CSPs
Other Threshold Cryptography Products?
Do you have a need for threshold cryptographic solutions for other use cases? Let us know, as we may be able to assist you.
Sepior™ Threshold KMS
Sepior is unleashing the broader potential of private blockchains by enabling flexible, fine grained control over who has access to review and approve smart contracts and other content posted on the blockchain, using Sepior™ Threshold KMS for off-chain, blockchain privacy control.
Control the confidentiality and privacy of smart contract data using threshold cryptography
Works with any blockchain technology or smart contract application
Fine grained control over who has access to specific fields of content in smart contracts and the freedom to modify policies at any time, on a per-user basis
Decreased risk of user access fraud through effective key management
Eliminate or minimize the scale, granularity, and complexity concerns of on-chain privacy models
Potential to support multi-party threshold and quorum approvals for smart contract signatures
Dramatically reduced potential for key theft by never producing a whole key on any key server, at any time
Potential to satisfy existing and future regulatory requirements with off-chain flexibility.
Sepior is redefining the gold standard for cryptocurrency wallet and transaction security with the introduction of Sepior™ ThresholdSig.
Institutional-grade wallet security
Advanced security using multiple approvers
Appears on-chain as a single signature
Typically 20% to 40% smaller transaction sizes than MultiSig approved transactions
Lower transaction fees like a single signature
More transactions per block, to maximize throughput
m of n signature control for flexible approvals and key share recovery
Ability to add/delete approvers off-chain, without generating a new key for static account addresses
No on-chain broadcast of policies or changes for greater privacy and security
Dramatically reduced potential for key theft by never producing a whole key on any device, at any time.
Sepior™ Threshold KMaaS
Maintaining the confidentiality, integrity, and access of customer data stored in cloud services is important for any Cloud Service Provider (CSP). Giving customers more control, with cost-effective key management as a service (KMaaS) will be an increasingly important metric for customers. Sepior™ Threshold KMaaS is a white label KMaaS that makes it easy, and cost-effective for CSPs to offer KMaaS to subscribers.
KMaaS can be provided using hardware security modules (HSMs), but with substantial costs and operational complexity. And customers must trust that the CSP will not exploit their control of the HSM/key for unauthorized purposes, including warrant compliance.
Threshold KMaaS, a white label service available to CSPs, provides the option to easily integrate and offer HSM-like KMaaS, without the cost or complexity of procuring, managing, scaling, and maintaining HSMs.
Threshold KMaaS supports multiple operational models:
Threshold KMaaS as a fully managed service, or
Customer hosted BYOK service for key management across one or multiple CSP clouds.
Threshold KMaaS uses multiparty computation (MPC) to enable three or more VM’s, hosted in one or multiple clouds, to collectively function as a distributed, virtual HSM, for high availability KMaaS, without the cost or complexity of deploying redundant HSMs
Cloud-native integration makes Threshold KMaaS a seamless extension to your existing SaaS services
Unlike conventional HSM’s, Threshold KMaaS servers never create a whole key on any key server, at any time, dramatically reducing the potential for key theft.