Coming soon
Threshold Key
Management Service
A fully fledged threshold FHE key generation and decryption protocol.
Read white paper [coming soon]
Read white paper [coming soon]
Read white paper [coming soon]
Read white paper [coming soon]
Read white paper [coming soon]
Read white paper [coming soon]
Read white paper [coming soon]
Read white paper [coming soon]
Multiparty FHE requires a shared decryption between parties. However, managing and securing private keys across multiple parties is challenging and increases the risk of unauthorized access.
Zama's TKMS* Enables Secure and Robust FHE Key Generation and Decryption
*A Key Management Service (KMS) is used to secure cryptographic keys.
Blockchain
Confidential smart contracts with full composability.
AI
AI model training on encrypted data from multiple parties.
Compliance & AML
Secure collaboration on KYC & AML between financial institutions.
Governance
Secure electronic voting for governments, companies and DAOs.
Defense
Secure collaboration between government agencies across borders.
Healthcare
Confidential collaboration on research initiatives.
Fully decentralized private key
Private keys are distributed in the decentralized network, enhancing security.
Resistant to DoS attacks
Only 2/3 of the KMS nodes are required to maintain the service.
Verifiable and auditable
Anyone can verify the activity and integrity of the KMS.
Enterprise-Grade Security*
via a Defense-In-Depth Approach
*Security audit and certification is ongoing, and will be completed soon.
PoA blockchain
The integrity and verifiability of decryption requests are ensured via a Proof of Authority blockchain consensus.
Threshold MPC
Security and liveness is guaranteed via a robust threshold MPC protocol for key generation and decryptions.
Secure enclaves
Offchain collusion is prevented by keeping the private key shares inside a secure enclave such as Amazon Nitro.
Legal contracts
Nodes are chosen based on reputation and experience, and sign a legally binding agreement to behave honestly.
Zama's TKMS Enables Secure and Robust FHE Key Generation and Decryption
Using Zama's TKMS is as easy as 1,2,3
We build open-sources product with a developer-first approach so you can integrate our solutions seamlessly.
1
Configure the KMS
It can be configured via Zama's developer console, or by uploading a configuration smart contract to the KMS chain.
Generate your FHE keys
Threshold key generation is triggered via Zama's developer console, or by submitting a transaction to the KMS chain.
2
Decrypt ciphertexts
Decrypting FHE ciphertexts is done via an API call, or by submitting a transaction directly to the KMS chain.
3
POWERED BY ZAMA