Loading...
private.me Docs
Get xKey
PRIVATE.ME PLATFORM

xKey: Cryptographic Key Split Custody

XorIDA splits any cryptographic key across independent custodians. No single party holds a complete key. Threshold reconstruction with HMAC verification on every share.

Cryptography COMING SOON XorIDA Powered
Section 01

The Problem

Cryptographic keys stored in single locations are high-value targets. A single breach exposes the entire cryptographic perimeter.

Hardware Security Modules (HSMs) are expensive, vendor-locked, and still represent a single physical point of failure. Organizations spend millions on HSM infrastructure only to discover that the key material inside is one insider threat, firmware vulnerability, or physical compromise away from total exposure.

Key compromise is catastrophic: a stolen root CA key invalidates every certificate ever issued. A leaked TLS private key enables retroactive decryption of all recorded traffic. A compromised signing key allows forged software updates to propagate to every endpoint. There is no graceful recovery from key theft.

The Old Way

SINGLE HSM Root CA Key TLS Private Key Signing Key ATTACKER TOTAL BREACH
Section 02

The PRIVATE.ME Solution

XorIDA splits any cryptographic key into N shares distributed across independent custodians. Only K-of-N shares are needed to reconstruct. No single custodian holds usable key material.

Unlike Shamir's Secret Sharing which operates over finite fields with 500-2000x overhead, XorIDA operates over GF(2) to achieve information-theoretic security at near-zero computational cost. A 256-bit key splits in microseconds.

Every share is HMAC-SHA256 verified before reconstruction. Tampered, corrupted, or forged shares are rejected instantly. The system fails closed: if any share fails verification, the entire reconstruction is aborted.

The New Way

CRYPTO KEY 256-bit XorIDA Split K-of-N Custodian A HMAC verified Custodian B HMAC verified Custodian C HMAC verified 2-of-3 OK
Section 03

How It Works

The key split custody pipeline transforms a single high-value cryptographic key into distributed shares that individually reveal nothing about the original key material.

Input Key Any format Serialize TLV encode XorIDA Split GF(2) matrix HMAC Tag Per share Share 1 Share 2 Share N
Key Security Properties
Information-theoretic security: Each share contains zero information about the original key. Unlike computational security, this guarantee holds even against unbounded adversaries. HMAC-SHA256 integrity: Every share carries a cryptographic tag. Tampering is detected before reconstruction begins. Fail-closed design: If any share fails HMAC verification, the entire operation aborts. No partial reconstruction is possible.
Section 04

Use Cases

🏛
Certificate Authority
Root CA Key Protection

Split root CA signing keys across board members or geographic sites. No single administrator can issue rogue certificates. Threshold ceremony for issuance.

2-of-3 threshold
🔒
Web Infrastructure
TLS Private Key Custody

Distribute TLS private keys across CDN edge nodes or security teams. Key rotation without single-point exposure. Perfect forward secrecy preserved.

3-of-5 threshold
📦
Software Supply Chain
Signing Key Management

Code signing keys split across release engineers. No single engineer can sign malicious updates. Multi-party approval built into the key itself.

2-of-3 threshold
🏦
Enterprise Security
Encryption Key Escrow

Enterprise encryption keys split across compliance officers. Regulatory access requires threshold cooperation. Full audit trail of every reconstruction.

3-of-5 threshold
Section 05

Integration

Quick Start
import { splitKey, reconstructKey } from '@private.me/keysplit';

// Split a root CA key across 3 custodians (2 needed to reconstruct)
const shares = await splitKey(rootCaKey, custodians, {
  n: 3,
  k: 2,
});

// Distribute shares to independent custodians
await Promise.all(shares.map((s, i) =>
  deliverToCustodian(custodians[i], s)
));

// Reconstruct with any 2 shares
const key = await reconstructKey([shares[0], shares[2]]);
splitKey(key: CryptoKey, custodians: string[], config: { n: number, k: number }): Promise<KeyShare[]>
Splits a CryptoKey into N shares with a K-of-N threshold. Each share is HMAC-tagged and serialized for safe transport. Supports RSA, ECDSA, ECDH, and AES key types.
reconstructKey(shares: KeyShare[]): Promise<CryptoKey>
Reconstructs the original CryptoKey from K or more shares. HMAC verification runs on every share before reconstruction begins. Fails closed on any integrity violation.
Section 06

Security Properties

PropertyMechanismGuarantee
ConfidentialityXorIDA GF(2) splittingInformation-theoretic (unconditional)
IntegrityHMAC-SHA256 per shareTamper detection before reconstruction
AvailabilityK-of-N thresholdTolerates N-K custodian failures
Non-repudiationShare index + UUID bindingEach share traceable to custodian
Forward SecrecyPer-operation random matrixCompromised share reveals nothing about other operations
<1ms
256-bit key split
0
Dependencies
100%
Test coverage
GF(2)
Field arithmetic
VERIFIED BY XPROVE

Verifiable Data Protection

Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.

XPROVE AUDIT TRAIL
Every XorIDA split generates HMAC-SHA256 integrity tags. xProve chains these into a tamper-evident audit trail that proves data was handled correctly at every step. Upgrade to zero-knowledge proofs when regulators or counterparties need public verification.

Read the xProve white paper →
GET STARTED

Ready to deploy xKey?

Talk to Ren, our AI sales engineer, or book a live demo with our team.

Book a Demo

© 2026 StandardClouds Inc. dba PRIVATE.ME. All rights reserved.

VERIFIABLE WITHOUT CODE EXPOSURE

Ship Proofs, Not Source

xKey generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.

XPROVE CRYPTOGRAPHIC PROOF
Download proofs:

Verify proofs online →

Use Cases

🏛️
REGULATORY
FDA / SEC Submissions
Prove algorithm correctness for distributed systems without exposing trade secrets or IP.
Zero IP Exposure
🏦
FINANCIAL
Audit Without Access
External auditors verify secure operations without accessing source code or production systems.
FINRA / SOX Compliant
🛡️
DEFENSE
Classified Verification
Security clearance holders verify distributed systems correctness without clearance for source code.
CMMC / NIST Ready
🏢
ENTERPRISE
Procurement Due Diligence
Prove security + correctness during RFP evaluation without NDA or code escrow.
No NDA Required

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/xkey
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While xKey is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →