Quantum-Safe Trust Infrastructure

Collaborate Across Boundaries. Control Every Disclosure.

Sorcha lets multiple organizations work together on shared workflows while each party controls exactly what data they reveal. Every action is cryptographically signed, every record is immutable, and every credential is verifiable.

7+ Crypto Algorithms
7 Microservices
2700+ Tests Passing
8 Standards
Supply Chain Workflow
1 Submit Order
2 Verify & Sign
3 Confirm
Selective Disclosure
Buyer sees: Item Qty
Seller sees: Item Price
Security Model

The DAD Security Framework

Three pillars of data protection that eliminate the trust problem in multi-party collaboration

Disclosure

Every party sees only what they should

JSON Schema-driven selective disclosure controls exactly which fields each participant can access. A buyer sees product and quantity. A supplier sees product and price. Neither sees the other's sensitive data.

  • Field-level access control via JSON Pointers (RFC 6901)
  • Schema-validated data at every step (JSON Schema Draft 2020-12)
  • SD-JWT Verifiable Credentials for selective claim presentation

Alteration

Every change is permanent and provable

All actions are cryptographically signed by participant wallets, hash-linked into an immutable chain, and sealed into dockets. You cannot alter history without detection.

  • SHA-256 chain-linked transactions with docket sealing
  • Hybrid classical + post-quantum signatures (ED25519 + ML-DSA-65, P-256, RSA-4096)
  • Validator consensus before docket finalization
  • Zero-knowledge proofs for privacy-preserving auditability

Destruction

Data survives because the network does

Peer-to-peer replication across the network means no single point of failure can destroy records. If one node goes down, others maintain the complete ledger state.

  • gRPC gossip protocol reaches 90% of network in under 60 seconds
  • Automatic sync and recovery for offline nodes
  • Bloom filter deduplication prevents network flooding
Compliance

Built on Open Standards

Not a proprietary black box. Sorcha implements internationally recognized standards so your data and credentials are portable, verifiable, and future-proof.

EU Regulation

eIDAS 2.0 Ready

Issue and verify electronic attestations that align with the European Digital Identity framework. Sorcha's credential system supports the trust model required for cross-border recognition.

IETF RFC 9449

SD-JWT Verifiable Credentials

Selective Disclosure JSON Web Tokens allow holders to present only the claims needed for a given interaction — proving you're over 18 without revealing your birth date.

W3C Specification

Decentralized Identifiers

Self-sovereign did:sorcha identifiers give every wallet and register a globally resolvable identity without relying on a central authority.

Bitcoin Standard

BIP32 / BIP39 / BIP44

Hierarchical deterministic wallets derived from a single seed phrase. Create unlimited addresses from one recovery phrase, just like leading cryptocurrency wallets.

NIST / FIPS

FIPS 186-4 & 180-4

Government-grade cryptographic standards. NIST P-256 elliptic curves for signing, SHA-256 for hashing, AES-256-GCM for payload encryption at rest.

IETF RFC 6901

JSON Pointer & JSON Schema

Fine-grained data addressing and validation using standardized JSON tools. Every payload is validated against its schema before it enters the ledger.

NIST / CNSA 2.0

FIPS 203, 204 & 205

NSA's Commercial National Security Algorithm Suite 2.0. ML-DSA-65 lattice signatures, ML-KEM-768 key encapsulation, and SLH-DSA-128s hash-based signatures — deployed today, not waiting for "Y2Q".

Zero-Knowledge Proofs

Pedersen Commitments

Prove transaction inclusion or value ranges without revealing underlying data. Schnorr proofs on secp256k1 enable privacy-preserving compliance audits.

Post-Quantum Cryptography

Quantum-Safe by Design

Not bolted on later — quantum resistance is woven into every layer. CNSA 2.0 compliant algorithms protect your data against both today's threats and tomorrow's quantum computers.

Hybrid Signing

Classical + PQC dual signatures. Your transactions are protected today by proven algorithms and tomorrow by quantum-resistant ones — simultaneously.

Post-Quantum Encryption

ML-KEM-768 key encapsulation with AES-256-GCM. Confidential payloads stay confidential even against future quantum computers.

Threshold Signatures

BLS12-381 t-of-n distributed validation. No single validator holds the complete signing key — consensus requires a threshold of participants.

Zero-Knowledge Proofs

Pedersen commitments with Schnorr proofs. Auditors verify transaction inclusion and value ranges without seeing the underlying data.

CNSA 2.0 Compliant · FIPS 203/204/205 · NIST Level 3 · Per-Register Crypto Policy
Real-World Applications

Where Trust Meets Workflow

Any process involving multiple organizations, sensitive data, and the need for an auditable record is a perfect fit for Sorcha

Healthcare

Share patient referrals and claims between providers, insurers, and labs. Protected health information is encrypted and disclosed only to authorized parties via schema-controlled access.

Data Privacy Consent Management

Financial Services

Trade settlements, loan syndication, and cross-border payments with cryptographic proof of every step. Regulators get read access to the audit trail without accessing transaction details.

Immutable Records Regulatory Access

Education & Credentials

Issue verifiable diplomas, certifications, and professional licenses as SD-JWT credentials. Graduates present proof to employers without exposing their full transcript.

Verifiable Credentials eIDAS Aligned

Government & Regulation

License issuance, permit approvals, and regulatory reporting with full audit trails. Citizens present verifiable attestations to any government service without redundant paperwork.

Governance Digital Identity

Consortium Operations

Industry groups and multi-stakeholder initiatives coordinate through decentralized governance with quorum-based voting. No single entity controls the register.

Quorum Voting Decentralized
Platform Capabilities

Everything You Need to Orchestrate Trust

Seven microservices, one unified platform. From visual workflow design to cryptographic verification, every capability is built in.

Visual Blueprint Designer

Drag-and-drop workflow builder with live preview. Define actions, participants, routes, conditions, and data schemas — then deploy directly to the ledger.

HD Cryptographic Wallets

Hierarchical deterministic wallets with classical and post-quantum algorithm support. Quantum-safe ws2 Bech32m addresses alongside standard ws1 addresses. Full BIP32/39/44 compliance.

Verifiable Credentials

Issue, store, and present eIDAS-aligned SD-JWT credentials. Gate workflow actions on credential proof. Chain credentials across multiple blueprints.

Immutable Ledger

SHA-256 chain-linked transactions sealed into dockets. Every action cryptographically signed by participant wallets. Validator consensus before finalization.

Decentralized Governance

Quorum-based register governance with role hierarchy. Add admins, transfer ownership, or modify access — all recorded as immutable control transactions.

Real-Time Collaboration

SignalR-powered live notifications for action submissions, workflow progress, and transaction confirmations. Know instantly when it's your turn to act.

Quantum-Safe Cryptography

Hybrid classical + post-quantum signing, ML-KEM-768 encryption, BLS threshold signatures, and zero-knowledge proofs. Per-register crypto policy lets each organization set their own quantum migration timeline.

Security Architecture

Defence in Depth

Multiple independent layers of protection ensure that compromising one component cannot compromise the system

1

Wallet Signatures

Every transaction is signed by the sender's private key. Multi-algorithm support (ED25519, P-256, RSA-4096) means organizations choose the algorithm that matches their security requirements. Now with hybrid classical + post-quantum (ML-DSA-65) dual signatures for quantum resistance.

2

Payload Encryption

AES-256-GCM and ML-KEM-768 hybrid encryption protect payloads against both classical and quantum attack. Each payload gets a unique key and initialization vector. Even database administrators cannot read transaction content.

3

Chain Integrity

Transactions are hash-linked into an immutable chain. Sealed dockets (blocks) are verified by the validator service before finalization. Fork detection catches any attempt at ledger manipulation.

4

Governance Enforcement

Role-based access control at the register level. Only authorized wallets — verified through the governance roster and quorum voting — can submit transactions to a given register.

5

Network Replication

Peer-to-peer replication across the network ensures data survives node failures. The gossip protocol distributes updates efficiently with O(log N) message complexity.

6

Zero-Knowledge Verification

Pedersen commitment proofs let auditors verify transaction inclusion and value ranges without accessing the underlying data. Compliance without disclosure.

Workflow

From Design to Execution in Four Steps

01

Design Your Blueprint

Use the visual designer or JSON/YAML to define participants, actions, data schemas, routes, and disclosure rules for your multi-party workflow.

02

Publish to the Ledger

The blueprint is validated for schema correctness and cycle-free routing, then published to a register. Participants are notified in real time via SignalR.

03

Execute Actions

Each participant submits their action data, signs it with their wallet, and the engine validates, calculates, routes, and discloses — all in a single atomic operation.

04

Verify and Audit

Every step is recorded on the immutable ledger. Verifiable credentials can be issued as proof of completion. The full audit trail is always available.

Technology

Cloud-Native. Enterprise-Ready.

Built on .NET 10 with .NET Aspire orchestration. Seven microservices with full observability, health checks, and horizontal scaling.

.NET 10
LTS Runtime
Aspire
Orchestration
PostgreSQL
Relational Data
MongoDB
Document Store
Redis
Cache & Sync
gRPC
P2P Network
SignalR
Real-Time
Blazor
WASM UI
BouncyCastle
PQC Algorithms

Ready to Build Trust Into Your Workflows?

Start designing secure, multi-party processes with cryptographic guarantees and verifiable credentials — no blockchain expertise required.