Information-Theoretically Threshold Split-Channel Communication Over DID Service Endpoints with Bounded Blast Radius
Secure machine-to-machine communication via DID documents, threshold IDA, and three-dimensional compromise bounding. No single operator sees plaintext. Key compromise is temporally, scope, and content bounded.
Core Split-Channel Delivery via DID Endpoints
Secure message delivery between automated entities via DID documents and threshold IDA. Resolve recipient DID, select channels from independent operators, encrypt, sign, split, and transmit shares to channel endpoints.
Bounded Blast Radius: Temporal + Scope + Content
Three independent bounds on signing key compromise: temporal (nonce TTL + timestamp max age), scope (directed permission graph), and content (encrypt-then-sign with separate keys). Immediate revocation via trust registry.
Trust Registry System
System for managing cryptographic identity and authorization: trust registry with DID, public key, role, and revocation. Directed permission graph, DID resolver, envelope verifier, and instant revocation interface.
Envelope Verification Pipeline
Instructions for receiving an envelope, rejecting stale timestamps, atomically checking nonces, resolving sender DID, verifying Ed25519 signature, querying the permission graph, and decrypting the payload.
Cross-Organizational Split-Channel
Secure cross-org communication: encrypt and threshold IDA across 3+ independent operators. Neither organization holds reconstructable shares. Compromise of either org alone reveals nothing. Satisfies attorney-client, HIPAA, and SEC requirements.
Encrypt-Then-Split-Ciphertext Protocol Order CONTINUATION 1
Encrypt payload first, then split ciphertext via threshold IDA. Signature covers ciphertext (not plaintext). At recipient: accumulate shares, verify, reconstruct ciphertext, verify signature, decrypt.
Signing Key Custody via Threshold Dispersal CONTINUATION 1
Generate asymmetric keypair, apply threshold IDA to private key producing n shares distributed to independent custody locations. Reconstruct transiently only at signing time, discard immediately. Key never exists complete except during signing.
Trust Registry Apparatus CONTINUATION 1
Comprehensive system: entity identity store, directed permission graph, nonce store, DID resolver, envelope verifier, revocation interface. Three-dimensional bounded blast radius enforced by coordinated operation.
Bounded Blast Radius Without Threshold Sharing CONTINUATION 1
Bounding signing key compromise without IDA: distinct key pairs for signing/encryption, per-message nonce and timestamp, signed envelope. Compromise bounded temporally, by scope, and by content.