API Documentation Pricing Plugins Developer Kit The Math Break This Blog Portal →
Zero-Key-Exchange Architecture

Zero-Key-Exchange Architecture

Brandon Myers · · 19 min read White Papers
Zero-Key-Exchange Architecture - TreeChain Labs
Zero-Key-Exchange Architecture | TreeChain Whitepaper

Zero-Key-Exchange Architecture

Provenance-Based Distributed Decryption Without Key Transmission

Version 1.0
Date January 2026
Author Brandon "Bran" Myers
Organization TreeChain Labs
Classification Public (Redacted)

Abstract

This whitepaper introduces the Zero-Key-Exchange (ZKE) architecture, a novel approach to distributed cryptography where data encrypted on one server can be decrypted by any other server in a mesh network without transmitting key material across the network. Unlike traditional key exchange protocols (Diffie-Hellman, RSA key transport, or pre-shared keys), ZKE derives decryption keys independently at each node using provenance data embedded within the ciphertext itself. We document the architectural principles, security properties, and empirical validation of this approach as implemented in TreeChain's global mesh infrastructure. Specific implementation details are intentionally redacted per Kerckhoffs's principle.

1. Introduction

Cryptographic key exchange has been called "the hardest problem in cryptography" โ€” not because the math is difficult, but because the logistics are treacherous. Every key that traverses a network is a key that can be intercepted. Every key stored on a server is a key that can be stolen. The history of cryptographic breaches is largely a history of key management failures.

TreeChain's Zero-Key-Exchange (ZKE) architecture takes a fundamentally different approach: keys are never transmitted because keys are never needed to be transmitted. Instead, each server in our global mesh independently derives the same cryptographic keys from provenance data embedded in the ciphertext itself.

Definition: Zero-Key-Exchange (ZKE)

A cryptographic architecture where multiple independent nodes can perform decryption operations on shared ciphertext without any key material being transmitted between nodes, either during setup or at runtime. Keys are derived, not exchanged.

1.1 The Innovation

The core insight is simple: if all servers share the same derivation algorithm and the same seed material, they will independently compute the same keys when given the same inputs. The inputs โ€” what we call "provenance" โ€” are embedded in the ciphertext and travel with it.

This means:

  • Server A in Helsinki encrypts patient data
  • Server B in Oregon receives only the ciphertext
  • Server B decrypts successfully โ€” without ever receiving a key from Server A
  • No key material traversed the network between them
๐Ÿ”‘

Key Principle

The key derivation inputs travel with the payload, but an attacker cannot use them without knowing the derivation algorithm and the master secrets that live on each server.

๐Ÿ”ฌ See It In Action

Watch data encrypt on one continent and decrypt on another โ€” with zero key transmission.

2. The Key Exchange Problem

Traditional encryption systems face a fundamental chicken-and-egg problem: to communicate securely, you need to share a key; but to share a key securely, you need... secure communication.

2.1 Historical Solutions

Approach Method Weakness
Pre-Shared Keys (PSK) Keys distributed out-of-band before communication Doesn't scale; key storage becomes target
Diffie-Hellman Mathematical key agreement over insecure channel Vulnerable to MitM without authentication
RSA Key Transport Encrypt session key with recipient's public key Requires PKI; no forward secrecy
Kerberos / KDC Trusted third party distributes session keys Single point of failure; scalability limits
TLS 1.3 Ephemeral Diffie-Hellman with certificates Requires certificate infrastructure

2.2 The Common Thread

All of these approaches share a fundamental assumption: keys must move. Either the key itself moves (encrypted or not), or mathematical values move that allow both parties to compute the key. In either case, key-related data traverses the network.

The Key Transit Problem

Any data that traverses a network can be intercepted. Any data that is intercepted can be stored. Any stored data can eventually be decrypted given sufficient time, computational advances, or key compromise. Therefore: minimizing key-related network transit minimizes attack surface.

2.3 What If Keys Never Moved?

The ZKE architecture asks a different question: what if both parties could independently arrive at the same key without exchanging anything?

This is possible if:

  1. Both parties share a common derivation algorithm (via shared codebase)
  2. Both parties share common seed material (via secure deployment)
  3. Both parties have access to the same derivation inputs (via the ciphertext itself)

The ciphertext becomes a self-contained package: it carries not just the encrypted data, but the parameters needed to derive the decryption key โ€” parameters that are useless without the algorithm and seeds that live only on authorized servers.

3. ZKE Architecture Overview

3.1 System Components

Component 1

Shared Codebase

Identical derivation algorithm deployed to all nodes

Component 2

Shared Seeds

Master secrets deployed securely at provisioning

Component 3

Provenance

Derivation inputs embedded in ciphertext

3.2 Encryption Flow

Step 1

Generate Provenance

โ†’
Step 2

Derive Key

โ†’
Step 3

Encrypt Data

โ†’
Step 4

Embed Provenance

โ†’
Step 5

Output Ciphertext

3.3 Decryption Flow (Different Server)

Step 1

Receive Ciphertext

โ†’
Step 2

Extract Provenance

โ†’
Step 3

Derive Same Key

โ†’
Step 4

Decrypt Data

โ†’
Step 5

Output Plaintext

Key Insight

Notice that no key-related data flows between Server A and Server B. Server B derives the exact same key that Server A used โ€” independently, locally, without any communication with Server A.

3.4 What Travels vs. What Stays

Element Location Travels?
Derivation Algorithm Each server (deployed) โœ— No
Master Seeds Each server (provisioned) โœ— No
Derived Keys Memory only (ephemeral) โœ— No
Provenance Data Embedded in ciphertext โœ“ Yes (with ciphertext)
Ciphertext Network / storage โœ“ Yes

4. Provenance-Based Key Derivation

"Provenance" refers to the origin and history of the ciphertext โ€” metadata that uniquely identifies when, where, and under what conditions the encryption occurred. This provenance serves as the input to the key derivation function.

4.1 Provenance Components

๐Ÿ”’ Redacted: Specific Provenance Fields

The exact structure of provenance data is proprietary. Per Kerckhoffs's principle, security does not depend on this secrecy, but disclosure would reduce defense-in-depth. We confirm that provenance includes cryptographically random components, temporal components, and contextual components.

4.2 Derivation Properties

The key derivation function has these essential properties:

Property 1: Determinism

Given identical inputs (provenance + seeds), the function always produces identical output (key). This is what enables cross-mesh decryption.

Property 2: Irreversibility

Given the output (key), it is computationally infeasible to recover the inputs. Even with the provenance, the seeds cannot be derived.

Property 3: Avalanche Effect

A single-bit change in any input produces a completely different output. This prevents related-key attacks.

4.3 Security of Exposed Provenance

A natural question: if provenance travels with the ciphertext, doesn't that help an attacker?

The answer is no, because:

  • Provenance alone is insufficient: Without the master seeds and derivation algorithm, provenance is just metadata
  • Seeds never leave servers: The critical missing component is never exposed
  • Algorithm is not public: Even with provenance and hypothetical seed theft, the attacker needs the exact derivation logic
Key = Derive(Provenance, Seeds, Algorithm)

Attacker has: Provenance โœ“, Ciphertext โœ“
Attacker lacks: Seeds โœ—, Algorithm โœ—
โˆด Key cannot be derived
๐Ÿ›ก๏ธ

Defense in Depth

This is intentionally a multi-factor system. Compromising any single element (provenance, seeds, OR algorithm) is insufficient. An attacker needs ALL THREE simultaneously.

5. Mesh Infrastructure

TreeChain operates a global mesh of servers across multiple continents. Any server can encrypt, and any server can decrypt โ€” without coordination.

5.1 Current Deployment

๐Ÿ‡ซ๐Ÿ‡ฎ
EU-Helsinki

api-eu.treechain.ai

๐Ÿ‡บ๐Ÿ‡ธ
US-Oregon

api-us.treechain.ai

๐Ÿ‡ธ๐Ÿ‡ฌ
APAC-Singapore

api-apac.treechain.ai

โ˜๏ธ
Global Edge

Render CDN

5.2 Mesh Properties

Property Description Benefit
No Single Point of Failure Any node can handle any request Geographic redundancy
No Key Synchronization Nodes don't need to communicate keys Eliminates sync vulnerabilities
Instant Scalability New nodes just need codebase + seeds No key distribution delays
Partition Tolerance Nodes work independently Network splits don't break crypto

5.3 Node Provisioning

When a new node joins the mesh:

  1. Deploy identical codebase (contains derivation algorithm)
  2. Provision master seeds via secure channel (one-time, out-of-band)
  3. Node is immediately operational โ€” no "key exchange" with other nodes

This is fundamentally different from traditional distributed systems where new nodes must receive keys from existing nodes or a central authority.

๐Ÿงช

Verify This Yourself

Run the Cross-Mesh Integrity test: ๐Ÿ“ The Math โ†’ Test 01. Encrypt on Helsinki, decrypt on Oregon. Watch the server labels โ€” no key ever travels between them.

6. Security Properties

6.1 What ZKE Defends Against

Attack Traditional Key Exchange ZKE Architecture
Key Interception (Network) Vulnerable during exchange No keys on network
Key Server Compromise All keys exposed No central key server
Man-in-the-Middle Possible without auth Nothing to intercept
Replay of Key Exchange Possible No exchange to replay
Traffic Analysis (Key Patterns) Key exchanges visible No key traffic exists

6.2 Security Assumptions

ZKE security depends on:

Assumption 1: Secure Deployment

The initial deployment of codebase and seeds to each node must be secure. If an attacker compromises a node at provisioning time, that node is compromised. This is the same assumption all systems make about initial setup.

Assumption 2: Node Integrity

Each node must maintain integrity of its codebase and seed storage. If an attacker gains root access to a node, they could extract seeds. Defense: HSMs, secure enclaves, intrusion detection.

Assumption 3: Algorithm Secrecy (Defense-in-Depth)

While security does not depend on algorithm secrecy (per Kerckhoffs), keeping the derivation algorithm private adds an additional barrier. This is defense-in-depth, not security-through-obscurity.

6.3 Cryptographic Foundation

ZKE is built on proven cryptographic primitives:

  • Encryption: ChaCha20-Poly1305 (256-bit AEAD)
  • Key Derivation: HMAC-based (details redacted)
  • Randomness: CSPRNG for provenance generation

We do not claim any novel cryptographic primitives. The innovation is architectural โ€” how these primitives are combined and deployed โ€” not mathematical.

7. Empirical Validation

We validate ZKE properties through live testing against production infrastructure.

7.1 Cross-Mesh Decryption Test

Test Procedure

Encrypt plaintext P on Server A. Send only the ciphertext C to Server B (where B โ‰  A). Decrypt on Server B. Verify output matches original plaintext P.

Metric Target Observed Status
Decryption Success Rate 100% 100% PASS
Output Match Rate 100% 100% PASS
Round-Trip Latency < 1000ms ~300-500ms PASS

7.2 Key Independence Verification

We verify that keys are derived independently (not transmitted) by examining network traffic:

  • Packet capture shows only ciphertext between servers
  • No key material, key identifiers, or key negotiation messages
  • Each server's key derivation is purely local computation

7.3 Stochastic Output Verification

We verify that provenance includes sufficient randomness:

  • Same plaintext encrypted twice produces different ciphertext
  • Both ciphertexts decrypt correctly on any server
  • Proves: provenance is unique per encryption, but derivation is consistent
๐Ÿงช

Run These Tests Yourself

All validation tests are available at ๐Ÿ“ The Math. Test 01 (Cross-Mesh) and Test 02 (Stochastic Non-Determinism) directly validate ZKE properties.

8. Comparison to Existing Approaches

8.1 vs. Traditional Key Exchange

Aspect Diffie-Hellman / RSA ZKE
Key Material on Network Yes (public keys, DH values) No
Requires PKI Yes (for authentication) No
Requires Coordination Yes (handshake) No
Adding New Nodes Certificate issuance, key distribution Deploy code + seeds

8.2 vs. Distributed Key Generation (DKG)

Aspect DKG (Threshold) ZKE
Key Shares Transmitted Yes (during generation) No
Requires Quorum Yes (t-of-n) No (any single node suffices)
Node Coordination Required for key operations Not required

8.3 vs. Zero-Knowledge Proofs

Despite the similar name, ZKE is distinct from Zero-Knowledge Proofs (ZKP):

  • ZKP: Prove knowledge of a secret without revealing the secret
  • ZKE: Derive keys independently without exchanging key material

These are complementary, not competing, techniques. TreeChain could incorporate ZKP for authentication while using ZKE for key derivation.

8.4 What ZKE Is NOT

  • Not a new cryptographic primitive: We use standard, proven algorithms
  • Not homomorphic encryption: We don't compute on encrypted data
  • Not quantum-resistant (inherently): Post-quantum security comes from the underlying primitives, not the architecture
  • Not trustless: You must trust that nodes were provisioned correctly

9. Limitations & Threat Model

9.1 What ZKE Does NOT Protect Against

Threat ZKE Protection Mitigation
Compromised Node (Root Access) No HSMs, secure enclaves, monitoring
Malicious Insider (Deployment) No Access controls, audit logs
Endpoint Compromise (Client) No Client-side security
Side-Channel Attacks No Constant-time implementations
Social Engineering No Training, policies

9.2 Trust Boundaries

ZKE assumes:

  • Trusted: TreeChain's deployment process, node operators, codebase integrity
  • Untrusted: Network between nodes, storage systems, clients

If you don't trust TreeChain's infrastructure, ZKE provides no additional security over traditional encryption. The benefit is in eliminating network-based key attacks, not in eliminating trust entirely.

9.3 Operational Considerations

Seed Rotation

Rotating master seeds requires coordinated redeployment to all nodes. During transition, both old and new seeds may need to be active. This is an operational complexity that traditional key exchange doesn't have.

Seed Backup

If all nodes lose their seeds simultaneously (catastrophic failure), data encrypted with those seeds is unrecoverable. Secure, distributed seed backup is essential.

10. Honest Claims

10.1 What We Claim

  • ZKE eliminates key material from network transit between encryption and decryption operations
  • Any node in our mesh can decrypt ciphertext produced by any other node
  • No inter-node communication is required for key derivation
  • The architecture reduces attack surface compared to traditional key exchange
  • Underlying cryptographic primitives (ChaCha20-Poly1305, HMAC) are industry-standard

10.2 What We Do NOT Claim

  • ZKE is not a replacement for all key management โ€” initial seed distribution still requires secure channels
  • ZKE does not provide "trustless" security โ€” you must trust our infrastructure
  • ZKE is not a novel cryptographic primitive โ€” the innovation is architectural
  • ZKE does not protect against compromised nodes โ€” defense-in-depth is still required
  • We do not claim to be "the first" to derive keys from embedded data โ€” we claim a specific, production-ready implementation for distributed mesh decryption
๐ŸŽฏ

Our Philosophy

We believe that honest disclosure of capabilities and limitations builds more trust than inflated claims. ZKE solves a real problem โ€” network-based key attacks โ€” without pretending to solve all problems.

๐Ÿ” Verify Our Claims

Every claim in this whitepaper can be tested against our live infrastructure.

Appendix A: Redacted Sections

The following details are intentionally omitted from this public document:

Section Reason for Redaction
Provenance Field Structure Defense-in-depth; reduces attacker knowledge
Key Derivation Function Details Core proprietary implementation
Seed Generation Process Operational security
Glyph Mapping Algorithm Steganographic layer details
Inter-layer Key Independence Defense-in-depth architecture

Per Kerckhoffs's principle, security does not depend on the secrecy of these details. However, their disclosure would reduce defense-in-depth without providing commensurate benefit to legitimate users or security researchers.

Security researchers who wish to examine these details under NDA may contact security@treechain.ai.

References

  1. Diffie, W. & Hellman, M. (1976). "New Directions in Cryptography." IEEE Transactions on Information Theory.
  2. Kerckhoffs, A. (1883). "La cryptographie militaire." Journal des sciences militaires.
  3. Bernstein, D.J. (2008). "ChaCha, a variant of Salsa20." Workshop Record of SASC 2008.
  4. IETF RFC 8439 (2018). "ChaCha20 and Poly1305 for IETF Protocols."
  5. Pedersen, T. (1991). "A Threshold Cryptosystem without a Trusted Party." EUROCRYPT '91.
  6. Boneh, D. & Franklin, M. (2001). "Identity-Based Encryption from the Weil Pairing." CRYPTO 2001.
  7. NIST SP 800-57 (2020). "Recommendation for Key Management."
Explore

View Pricing & Free Tier

Start with 1,000 free API calls/month. No credit card required.

Explore

Take the Break This Challenge

Prove you can crack TreeChain encryption and claim the 100,000 TREE bounty.

Explore

Enterprise Demo

See TreeChain encryption at scale across the global mesh network.

Explore

See the Cryptographic Proofs

NIST-based statistical tests running against live production servers.