Threshold Signing
NIST P-256, secp256k1, and Ed25519 curve support. Key shares stay split across nodes and signing requires quorum. Fully crypto-compatible.
Mitigate the risk of a full infrastructure compromise. TKeeper uses Threshold Cryptography to split authority across nodes. No single server holds the full key, making your infrastructure resilient to insiders and breaches. Open-source under Apache 2.0 License.
NIST P-256, secp256k1, and Ed25519 curve support. Key shares stay split across nodes and signing requires quorum. Fully crypto-compatible.
Encrypt and decrypt through threshold cryptography so no single host can expose full key material in operation.
Generation, refresh, rotation, expiration, and destroy policies with versioning.
Reduce audit risk and review overhead with verifiable operation evidence and built-in asset context in one place.
Learn MoreProve who did what and when, with cryptographic integrity on every operation-level audit event.
Request bodies are not persisted in audit trails, while event integrity and accountability remain verifiable.
If audit sinks are unavailable, secured actions are denied so teams do not run critical flows without evidence.
Built-in asset inventory and policy mapping make scoping, incident response, and regulator review significantly faster.
Cryptographic multi-party control combined with policy-enforced human authorization makes TKeeper suitable for both hot and warm key operation paths.
See Why It MattersTKeeper tolerates up to (n-t) node failures while threshold operations continue safely under quorum rules.
Even when nodes fail or an incident is isolated, TKeeper keeps operations running under quorum and preserves high availability for business-critical flows.
Learn how TKeeper detects and behaves when a node tries to violate the protocol or when nodes fail during an operation.
/v1/keeper/sign
{
"code": "SUCCESS",
"type": "SCHNORR",
"signature": {
"opId": "......"
},
"imposters": [
"keeper-2"
]
}One architecture for high-stakes teams: split key authority across nodes so no single breach, insider, or host can authorize alone.
Secure hot-wallet operations in an environment where more than $250M has been lost to reported private-key leak incidents over the last 3 years, excluding insider-risk losses.
Raise operational security by splitting key authority across facilities, partners, and regions instead of one central keeper.
Apply cryptographic dual-control for settlement and treasury operations, reducing insider abuse and single-system compromise risk.
Enforce inter-agency separation of duty so no single department can authorize critical actions alone.
Compare your current key model with threshold-based operations before rollout planning.
| Aspect | Standard KMS / HSM | TKeeper |
|---|---|---|
| Full secret key exists | Yes | No |
| Primary protection | IAM/ACL + hardware boundary | Cryptographic quorum (t-of-n) + IAM |
| Signing | Single-key sign | Threshold signing |
| Encryption | Single-key decrypt/encrypt | Threshold encryption/decryption |
| Key generation | Centralized | Distributed without reconstruction |
| Key lifecycle | Rotate/Destroy | Refresh/Rotate/Destroy |
| Host compromise / Insider Risk | May expose or allow abuse of full key | Resilient until less than t nodes are compromised |
| Audit logs | Service/provider logs | Operation-level logs |
| Asset inventory | Often external | Built-in mapping |
| Latency | Low | Interactive (higher) |
| Fault tolerance | Stops on outage | Tolerates up to (n-t) failures |
Get a deployment plan aligned with your controls before production: quorum design, policy boundaries, integration scope, and rollout sequence.
Get a dedicated expert to assess your current setup, identify key-risk gaps, and define a practical rollout path for TKeeper.
Hands-on integration support for your Identity Provider and scope-based authorization model.
Adapt or extend operational flows to match internal controls, approvals, and platform requirements.
Direct engineering channel for incident response, escalation, and fast troubleshooting during critical operations.