xKey: Cryptographic Key Split Custody
XorIDA splits any cryptographic key across independent custodians. No single party holds a complete key. Threshold reconstruction with HMAC verification on every share.
The Problem
Cryptographic keys stored in single locations are high-value targets. A single breach exposes the entire cryptographic perimeter.
Hardware Security Modules (HSMs) are expensive, vendor-locked, and still represent a single physical point of failure. Organizations spend millions on HSM infrastructure only to discover that the key material inside is one insider threat, firmware vulnerability, or physical compromise away from total exposure.
Key compromise is catastrophic: a stolen root CA key invalidates every certificate ever issued. A leaked TLS private key enables retroactive decryption of all recorded traffic. A compromised signing key allows forged software updates to propagate to every endpoint. There is no graceful recovery from key theft.
The Old Way
The PRIVATE.ME Solution
XorIDA splits any cryptographic key into N shares distributed across independent custodians. Only K-of-N shares are needed to reconstruct. No single custodian holds usable key material.
Unlike Shamir's Secret Sharing which operates over finite fields with 500-2000x overhead, XorIDA operates over GF(2) to achieve information-theoretic security at near-zero computational cost. A 256-bit key splits in microseconds.
Every share is HMAC-SHA256 verified before reconstruction. Tampered, corrupted, or forged shares are rejected instantly. The system fails closed: if any share fails verification, the entire reconstruction is aborted.
The New Way
How It Works
The key split custody pipeline transforms a single high-value cryptographic key into distributed shares that individually reveal nothing about the original key material.
Use Cases
Split root CA signing keys across board members or geographic sites. No single administrator can issue rogue certificates. Threshold ceremony for issuance.
2-of-3 thresholdDistribute TLS private keys across CDN edge nodes or security teams. Key rotation without single-point exposure. Perfect forward secrecy preserved.
3-of-5 thresholdCode signing keys split across release engineers. No single engineer can sign malicious updates. Multi-party approval built into the key itself.
2-of-3 thresholdEnterprise encryption keys split across compliance officers. Regulatory access requires threshold cooperation. Full audit trail of every reconstruction.
3-of-5 thresholdIntegration
import { splitKey, reconstructKey } from '@private.me/keysplit'; // Split a root CA key across 3 custodians (2 needed to reconstruct) const shares = await splitKey(rootCaKey, custodians, { n: 3, k: 2, }); // Distribute shares to independent custodians await Promise.all(shares.map((s, i) => deliverToCustodian(custodians[i], s) )); // Reconstruct with any 2 shares const key = await reconstructKey([shares[0], shares[2]]);
Security Properties
| Property | Mechanism | Guarantee |
|---|---|---|
| Confidentiality | XorIDA GF(2) splitting | Information-theoretic (unconditional) |
| Integrity | HMAC-SHA256 per share | Tamper detection before reconstruction |
| Availability | K-of-N threshold | Tolerates N-K custodian failures |
| Non-repudiation | Share index + UUID binding | Each share traceable to custodian |
| Forward Secrecy | Per-operation random matrix | Compromised share reveals nothing about other operations |
Verifiable Data Protection
Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.
Read the xProve white paper →
Ready to deploy xKey?
Talk to Ren, our AI sales engineer, or book a live demo with our team.
Ship Proofs, Not Source
xKey generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.
- Tier 1 HMAC (~0.7KB)
- Tier 2 Commit-Reveal (~0.5KB)
- Tier 3 IT-MAC (~0.3KB)
- Tier 4 KKW ZK (~0.4KB)
Use Cases
Deployment Options
SaaS Recommended
Fully managed infrastructure. Call our REST API, we handle scaling, updates, and operations.
- Zero infrastructure setup
- Automatic updates
- 99.9% uptime SLA
- Enterprise SLA available
SDK Integration
Embed directly in your application. Runs in your codebase with full programmatic control.
npm install @private.me/xkey- TypeScript/JavaScript SDK
- Full source access
- Enterprise support available
On-Premise Upon Request
Enterprise CLI for compliance, air-gap, or data residency requirements.
- Complete data sovereignty
- Air-gap capable deployment
- Custom SLA + dedicated support
- Professional services included
Enterprise On-Premise Deployment
While xKey is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:
- Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
- Air-gapped environments — SCIF, classified networks, offline operations
- Data residency requirements — EU GDPR, China data laws, government mandates
- Custom integration needs — Embed in proprietary platforms, specialized workflows
Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.