• Next generation security
    in tune with Blockchain
    Storage and control of cryptographic
    keys that underpin security
  • I. There are two distinct elements to
    Blockchain security:
    Creating an unalterable distributed record of events or transactions
    Ensuring that ledger entries have a usefulness or value
  • II. Security Essentials
    The value and trust of individual ledger entries comes from the
    application of security functions at nodes (or endpoints)
    • Such as authenticating the source or owner of an entry
    These functions ultimately rely on the security of
    cryptographic keys
  • III. Blockchain Security Characteristics
    No necessity for a central authority
    Individual nodes have responsibility for the security
    of the data they submit to the blockchain
    • Responsible for the security and availability
    of their cryptographic keys
  • IV. SEAcurIT-e
    Ensures the security of the cryptographic keys
    at nodes (or endpoints)
    Powerful and flexible management and control capabilities
    In tune with the security and control objectives
    of Blockchain

SEAcurit-e Applications

Blockchain Security

  • Build security and trust in to blockchain nodes
  • Add value by ensuring the secure and proper use of cryptographic functions
  • Adopt key management mechanism that respect the nature of Blockchain applications


  • Encryption, Integrity & Authentication
  • Reinforce the effectiveness of cryptographic functions
  • Enhance control over where and by whom security functions such as encryption, data integrity and authentication can be used
  • Provide a framework to support the use of cryptography in applications

Secure Key Storage

  • Ensure stored keys cannot be compromised
  • Ideally suited to software environments
  • Overcome typical storage restraints

Cryptographic Key Management

  • Fortify and enhance PKI and other schemes for the management of cryptographic keys
  • Can serve as a robust and practical alternative key management framework for constructing a wide range of secure applications
  • Obtain unique benefits and capabilities in security and control

Security Management

  • Manage access to security functions by controlling access to the keys on which they depend
  • Control who can access secure data or functions and when, and from which device
  • Monitor and control access to secure shared content
  • Apply artificial intelligence to determine instances where access to information may be denied, or require further checks

Ownership and Control of Data

  • Ownership and control of keys implies ownership and control of secure data
  • Provision of powerful and unique set of security and management capabilities ensures accountability

Blockchain Security Elements

There are two distinct elements to Blockchain security

  • An unalterable distributed register of events or transactions
    • An intrinsic and distinguishing feature of Blockchain
  • Ensuring that ledger entries have a usefulness or value, such as by authenticating the source or owner of an entry.

Security and control of cryptographic keys at nodes

  • Value and trust of ledger entries ultimately relies on the security and control of cryptographic keys at nodes, or endpoints
    • It is these values on which security operations depend
    • Control of keys gives control over secured data
  • The security, control and independent ownership of keys and consequently data at nodes is therefore of vital importance.

Characteristics of Blockchain give rise to specific security requirements

  • Security of nodes is vital for establishing trust and maintaining value
    • Protection and availability of security values is of crucial importance
  • In a decentralised environment, nodes have complete and independent control over  the secrecy of their security values
    • Reliance on trusted centres of security is undesirable

Security and control objectives specific to Blockchain

  • SEAcurIT‑e® meets the security and control objectives specific to Blockchain
  • Provides unique and substantial benefits in protecting and fortifying the security of such keys and ensuring their availability
  • Powerful and flexible management capabilities
    • From full independent control by nodes to a degree of centralised management over the use of security functions  without ceding control over secrecy