Dynamic Public Key Infrastructure

Identity without
gatekeepers.

Reshet is a patented protocol for decentralized identity verification. People, services, and devices cryptographically sign each other — building chains of trust with no central authority.

$ reshet verify --target 0x8a3f...c7d1 Traversing trust graph... 3-hop chain found Verifying RSA signatures along path... Validating Merkle root of identity share... ✓ Identity verified. Chain: you → Alice → Bob → target $

Trust shouldn't require
a middleman.

Today's identity systems rely on third-party services that are slow, expensive, and vulnerable. They require access to personal information and create single points of failure that attackers exploit.

01

Third-Party Dependency

Certificate authorities and identity providers act as gatekeepers. When they're compromised, breached, or unavailable — so is your identity.

02

Spoofing & Impersonation

Traditional methods depend on ancillary markers like IP addresses and behavioral analysis. When signals conflict, verification fails and attackers slip through.

03

No Cross-Device Trust

Billions of devices need to verify each other securely. Current PKI was built for web browsers, not IoT networks, autonomous systems, or peer-to-peer applications.


Publish. Sign. Verify.

Each device generates an RSA key pair and registers with a proof-of-work challenge. Identity data is stored as Merkle tree hashes for selective disclosure. Trust propagates through cryptographic signatures.

STEP 01

Publish

A device generates an RSA key pair, solves a proof-of-work challenge, and publishes its identity share — a Merkle-hashed set of personal attributes — to the network.

STEP 02

Sign

When two parties meet and verify each other in person, they cryptographically sign each other's identity shares. Each signature creates a directed trust edge in the graph.

STEP 03

Verify

To verify a stranger, the network finds the shortest path of signatures between you and them — up to 6 hops. Each RSA signature in the chain is independently verified.


What you can build.

Reshet opens possibilities for any application that needs secure identity without centralized dependencies.

// Commerce

Verified Checkout

Know your buyer is real before processing payment. Reshet replaces CAPTCHAs and fraud-scoring with cryptographic chain-of-trust verification at the point of sale.

// IoT

Device-to-Device Auth

Every device gets a wallet. Smart factories, autonomous vehicles, and sensor networks authenticate peers through the same trust graph that verifies people.

// Communication

Trusted Messaging

Verify the person on the other end before exchanging a single message. No phone numbers, no email confirmations — just cryptographic proof of identity.

// Identity

Portable Credentials

Prove your identity once, carry it everywhere. Merkle tree hashing lets you selectively disclose only the attributes each verifier needs — nothing more.


Built on math, not trust.

001

RSA Key Pairs

Every wallet generates its own public-private key pair. Identity is cryptographic, not assigned by an authority.

002

Merkle Tree Shares

Personal information is stored as a Merkle tree hash. Selective disclosure lets you prove individual attributes without revealing everything.

003

Proof-of-Work Registration

Wallet creation requires solving a computational challenge. This prevents Sybil attacks and ensures every identity has a real cost to create.

004

Graph Shortest Path

Verification traverses the trust graph using shortest-path algorithms. Maximum 6 hops. Multiple independent paths increase confidence.

005

Malicious Node Detection

The protocol detects and isolates compromised nodes. Revocation propagates through the graph, preserving network integrity.


Build on the trust graph.

Reshet is patented, built, and looking for partners. If you're working on identity, authentication, or IoT security — let's talk.

info@reshet.io

US Patent 12,132,843 — Method and Device for Dynamic Public Key Infrastructure