Dynamic Public Key Infrastructure
Identity without
gatekeepers.
Reshet is a patented protocol for decentralized identity verification. People, services, and devices cryptographically sign each other — building chains of trust with no central authority.
Trust shouldn't require
a middleman.
Today's identity systems rely on third-party services that are slow, expensive, and vulnerable. They require access to personal information and create single points of failure that attackers exploit.
Third-Party Dependency
Certificate authorities and identity providers act as gatekeepers. When they're compromised, breached, or unavailable — so is your identity.
Spoofing & Impersonation
Traditional methods depend on ancillary markers like IP addresses and behavioral analysis. When signals conflict, verification fails and attackers slip through.
No Cross-Device Trust
Billions of devices need to verify each other securely. Current PKI was built for web browsers, not IoT networks, autonomous systems, or peer-to-peer applications.
Publish. Sign. Verify.
Each device generates an RSA key pair and registers with a proof-of-work challenge. Identity data is stored as Merkle tree hashes for selective disclosure. Trust propagates through cryptographic signatures.
Publish
A device generates an RSA key pair, solves a proof-of-work challenge, and publishes its identity share — a Merkle-hashed set of personal attributes — to the network.
Sign
When two parties meet and verify each other in person, they cryptographically sign each other's identity shares. Each signature creates a directed trust edge in the graph.
Verify
To verify a stranger, the network finds the shortest path of signatures between you and them — up to 6 hops. Each RSA signature in the chain is independently verified.
What you can build.
Reshet opens possibilities for any application that needs secure identity without centralized dependencies.
Verified Checkout
Know your buyer is real before processing payment. Reshet replaces CAPTCHAs and fraud-scoring with cryptographic chain-of-trust verification at the point of sale.
Device-to-Device Auth
Every device gets a wallet. Smart factories, autonomous vehicles, and sensor networks authenticate peers through the same trust graph that verifies people.
Trusted Messaging
Verify the person on the other end before exchanging a single message. No phone numbers, no email confirmations — just cryptographic proof of identity.
Portable Credentials
Prove your identity once, carry it everywhere. Merkle tree hashing lets you selectively disclose only the attributes each verifier needs — nothing more.
Built on math, not trust.
RSA Key Pairs
Every wallet generates its own public-private key pair. Identity is cryptographic, not assigned by an authority.
Merkle Tree Shares
Personal information is stored as a Merkle tree hash. Selective disclosure lets you prove individual attributes without revealing everything.
Proof-of-Work Registration
Wallet creation requires solving a computational challenge. This prevents Sybil attacks and ensures every identity has a real cost to create.
Graph Shortest Path
Verification traverses the trust graph using shortest-path algorithms. Maximum 6 hops. Multiple independent paths increase confidence.
Malicious Node Detection
The protocol detects and isolates compromised nodes. Revocation propagates through the graph, preserving network integrity.
Build on the trust graph.
Reshet is patented, built, and looking for partners. If you're working on identity, authentication, or IoT security — let's talk.
info@reshet.ioUS Patent 12,132,843 — Method and Device for Dynamic Public Key Infrastructure