Quantum-safe proof for every transaction. Two independent post-quantum signatures that anyone can verify. No infrastructure changes required.
Send your transaction hash or payload through our API. No changes to your existing signing infrastructure.
Phoenix creates two independent quantum-safe signatures: ML-DSA (lattice-based, fast) + SLH-DSA (hash-based, conservative).
Anyone can verify both signatures using our open-source verifier. No trust in Phoenix required.
ML-DSA (FIPS 204) for speed. SLH-DSA (FIPS 205) for conservative security. Both must pass. If one algorithm falls, the other protects.
Private keys exist only for a single signing epoch, then self-destruct. Stolen keys cannot sign future transactions.
Hardware-grade deterministic core evolves cryptographic state with every operation. Auditable, reproducible, no external randomness dependency.
After a breach, hardware-backed entropy injection automatically heals the system. Attacker's snapshot becomes worthless.
All epoch public keys committed to a Merkle tree. Single root hash enables verification of any epoch key with cryptographic proof.
Suspicious activity triggers quarantine mode — only dummy signatures produced. Monotonic counters prevent state rollback attacks.
GenericPCSWrapper enables new PQC algorithms to be validated and deployed within one day. Future-proof by design.
| Capability | Phoenix | Fireblocks | Coinbase | BitGo | Cobo | Anchorage |
|---|---|---|---|---|---|---|
| Post-Compromise Security | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
| PQC (Dual Algorithm) | ✓ Dual | ✗ | ✗ | ✗ | ✗ | ✗ |
| Quantum Attestation | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
| Algorithm Agility | 1 day | 6–12 mo | 6–12 mo | 6–12 mo | 6–12 mo | 6–12 mo |
| Auto-Recovery | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
| Time to Replicate | — | 18–24 mo | 18–24 mo | 18–24 mo | 18–24 mo | 18–24 mo |
Start with a free 30-day pilot. No infrastructure changes. No risk.