Cryptography

Multi-Curve Architecture — Built for Every World

Four cryptographic curves engineered for maximum security — including Post-Quantum resistance. Ready today, protected tomorrow.

4
Curves
Production + Roadmap
FIPS
Compliant
NIST P256 for government
6
Curves
Ed25519, secp256k1, P-256, Falcon, BLS, P-384
Post-Q
Quantum Ready
Falcon-512 — protected when quantum arrives

Six Curves, Six Worlds

Each transaction chooses its own curve. The security level follows the use case — not a one-size-fits-all compromise.

Ed25519

Fastest signature verification in production — 3x faster than secp256k1. EdDSA with 128-bit security. The default curve for all ATSHI operations.

Default · Speed

secp256k1

The Ethereum/Bitcoin curve. Native MetaMask signing, EVM wallet compatibility, and seamless cross-chain operations via the JSON-RPC gateway.

EVM · Bitcoin

NIST P-256

Required by FIDO2/WebAuthn and W3C DID. Native to Apple Secure Enclave and Android Keystore. Passwordless authentication and mobile identity.

WebAuthn · Mobile

Falcon-512

NIST FIPS 206 post-quantum standard. Lattice-based signatures resistant to quantum computers. Compact signatures, future-proof by design.

Post-Quantum

BLS12-381

Signature aggregation — combine thousands of signatures into one. Essential for zkBridge zero-knowledge proofs and Ethereum 2.0 compatibility.

zkBridge · Aggregation

P-384 (secp384r1)

192-bit security level required by eIDAS 2.0 qualified signatures, NATO, and high-assurance government systems. The highest classical security tier.

eIDAS 2.0 · Enterprise

One Keychain, Six Curves, Per-Transaction Security

Each transaction can use a different curve. The Keychain derives the right key for the right use case automatically.

The ATSHI Difference

On Ethereum or Bitcoin, everything uses the same curve. On ATSHI, each transaction chooses its own curve based on its use case. A payment uses Ed25519 for speed. A WebAuthn login uses P-256 for mobile compatibility. A bridge operation uses secp256k1 for EVM compatibility. An eIDAS signature uses P-384 for regulatory compliance. A cross-chain proof uses BLS12-381 for aggregation. A long-term secret uses Falcon-512 for quantum resistance. Six curves, one keychain, zero compromise.

Supply Chain / IoT

Ed25519 — fast verification for high-frequency sensor data and lightweight devices.

🔒

WebAuthn / Mobile

P-256 — native to Apple Secure Enclave, Android Keystore, FIDO2 passwordless auth.

🔗

EVM / Cross-Chain

secp256k1 — MetaMask, Ethereum, Bitcoin compatibility. BLS12-381 for zkBridge aggregation.

🛡

Government / eIDAS / Quantum

P-384 for eIDAS 2.0 qualified signatures. Falcon-512 for post-quantum protection.

Transaction Chain + Keychain = Per-Transaction Curve

Every identity on ATSHI has its own Transaction Chain. Each transaction within that chain can use a different curve. The Keychain derives service-specific keys with the right curve via the derivation path. The curve follows the data criticality, not the other way around.

ATSHI vs. Other Chains — Including Post-Quantum

Feature Ethereum Solana QAN Platform ATSHI
Curves available1 (secp256k1)1 (Ed25519)1 (CRYSTALS-Dilithium)6 curves
Post-quantumNoNoYes (Dilithium)Yes (Falcon-512)
Multi-curveNoNoNoYes — per chain
Curve per serviceNoNoNoYes (TC + Keychain)
FIPS compliantNoNoNoYes (NIST P256)
Adaptive securityNo — same curve for allNo — same curve for allNo — PQ onlyYes — criticality-based

Future-Proof Your Cryptography

Four curves, one keychain. Choose the right cryptography for compliance, compatibility, or post-quantum resistance.