
Zero-Key-Exchange Architecture
Provenance-Based Distributed Decryption Without Key Transmission
Abstract
This whitepaper introduces the Zero-Key-Exchange (ZKE) architecture, a novel approach to distributed cryptography where data encrypted on one server can be decrypted by any other server in a mesh network without transmitting key material across the network. Unlike traditional key exchange protocols (Diffie-Hellman, RSA key transport, or pre-shared keys), ZKE derives decryption keys independently at each node using provenance data embedded within the ciphertext itself. We document the architectural principles, security properties, and empirical validation of this approach as implemented in TreeChain's global mesh infrastructure. Specific implementation details are intentionally redacted per Kerckhoffs's principle.
๐ Table of Contents
- Introduction
- The Key Exchange Problem
- ZKE Architecture Overview
- Provenance-Based Key Derivation
- Mesh Infrastructure
- Security Properties
- Empirical Validation
- Comparison to Existing Approaches
- Limitations & Threat Model
- Honest Claims
1. Introduction
Cryptographic key exchange has been called "the hardest problem in cryptography" โ not because the math is difficult, but because the logistics are treacherous. Every key that traverses a network is a key that can be intercepted. Every key stored on a server is a key that can be stolen. The history of cryptographic breaches is largely a history of key management failures.
TreeChain's Zero-Key-Exchange (ZKE) architecture takes a fundamentally different approach: keys are never transmitted because keys are never needed to be transmitted. Instead, each server in our global mesh independently derives the same cryptographic keys from provenance data embedded in the ciphertext itself.
Definition: Zero-Key-Exchange (ZKE)
A cryptographic architecture where multiple independent nodes can perform decryption operations on shared ciphertext without any key material being transmitted between nodes, either during setup or at runtime. Keys are derived, not exchanged.
1.1 The Innovation
The core insight is simple: if all servers share the same derivation algorithm and the same seed material, they will independently compute the same keys when given the same inputs. The inputs โ what we call "provenance" โ are embedded in the ciphertext and travel with it.
This means:
- Server A in Helsinki encrypts patient data
- Server B in Oregon receives only the ciphertext
- Server B decrypts successfully โ without ever receiving a key from Server A
- No key material traversed the network between them
Key Principle
The key derivation inputs travel with the payload, but an attacker cannot use them without knowing the derivation algorithm and the master secrets that live on each server.
๐ฌ See It In Action
Watch data encrypt on one continent and decrypt on another โ with zero key transmission.
2. The Key Exchange Problem
Traditional encryption systems face a fundamental chicken-and-egg problem: to communicate securely, you need to share a key; but to share a key securely, you need... secure communication.
2.1 Historical Solutions
| Approach | Method | Weakness |
|---|---|---|
| Pre-Shared Keys (PSK) | Keys distributed out-of-band before communication | Doesn't scale; key storage becomes target |
| Diffie-Hellman | Mathematical key agreement over insecure channel | Vulnerable to MitM without authentication |
| RSA Key Transport | Encrypt session key with recipient's public key | Requires PKI; no forward secrecy |
| Kerberos / KDC | Trusted third party distributes session keys | Single point of failure; scalability limits |
| TLS 1.3 | Ephemeral Diffie-Hellman with certificates | Requires certificate infrastructure |
2.2 The Common Thread
All of these approaches share a fundamental assumption: keys must move. Either the key itself moves (encrypted or not), or mathematical values move that allow both parties to compute the key. In either case, key-related data traverses the network.
The Key Transit Problem
Any data that traverses a network can be intercepted. Any data that is intercepted can be stored. Any stored data can eventually be decrypted given sufficient time, computational advances, or key compromise. Therefore: minimizing key-related network transit minimizes attack surface.
2.3 What If Keys Never Moved?
The ZKE architecture asks a different question: what if both parties could independently arrive at the same key without exchanging anything?
This is possible if:
- Both parties share a common derivation algorithm (via shared codebase)
- Both parties share common seed material (via secure deployment)
- Both parties have access to the same derivation inputs (via the ciphertext itself)
The ciphertext becomes a self-contained package: it carries not just the encrypted data, but the parameters needed to derive the decryption key โ parameters that are useless without the algorithm and seeds that live only on authorized servers.
3. ZKE Architecture Overview
3.1 System Components
Shared Codebase
Identical derivation algorithm deployed to all nodes
Shared Seeds
Master secrets deployed securely at provisioning
Provenance
Derivation inputs embedded in ciphertext
3.2 Encryption Flow
Generate Provenance
Derive Key
Encrypt Data
Embed Provenance
Output Ciphertext
3.3 Decryption Flow (Different Server)
Receive Ciphertext
Extract Provenance
Derive Same Key
Decrypt Data
Output Plaintext
Key Insight
Notice that no key-related data flows between Server A and Server B. Server B derives the exact same key that Server A used โ independently, locally, without any communication with Server A.
3.4 What Travels vs. What Stays
| Element | Location | Travels? |
|---|---|---|
| Derivation Algorithm | Each server (deployed) | โ No |
| Master Seeds | Each server (provisioned) | โ No |
| Derived Keys | Memory only (ephemeral) | โ No |
| Provenance Data | Embedded in ciphertext | โ Yes (with ciphertext) |
| Ciphertext | Network / storage | โ Yes |
4. Provenance-Based Key Derivation
"Provenance" refers to the origin and history of the ciphertext โ metadata that uniquely identifies when, where, and under what conditions the encryption occurred. This provenance serves as the input to the key derivation function.
4.1 Provenance Components
๐ Redacted: Specific Provenance Fields
The exact structure of provenance data is proprietary. Per Kerckhoffs's principle, security does not depend on this secrecy, but disclosure would reduce defense-in-depth. We confirm that provenance includes cryptographically random components, temporal components, and contextual components.
4.2 Derivation Properties
The key derivation function has these essential properties:
Property 1: Determinism
Given identical inputs (provenance + seeds), the function always produces identical output (key). This is what enables cross-mesh decryption.
Property 2: Irreversibility
Given the output (key), it is computationally infeasible to recover the inputs. Even with the provenance, the seeds cannot be derived.
Property 3: Avalanche Effect
A single-bit change in any input produces a completely different output. This prevents related-key attacks.
4.3 Security of Exposed Provenance
A natural question: if provenance travels with the ciphertext, doesn't that help an attacker?
The answer is no, because:
- Provenance alone is insufficient: Without the master seeds and derivation algorithm, provenance is just metadata
- Seeds never leave servers: The critical missing component is never exposed
- Algorithm is not public: Even with provenance and hypothetical seed theft, the attacker needs the exact derivation logic
Attacker has: Provenance โ, Ciphertext โ
Attacker lacks: Seeds โ, Algorithm โ
โด Key cannot be derived
Defense in Depth
This is intentionally a multi-factor system. Compromising any single element (provenance, seeds, OR algorithm) is insufficient. An attacker needs ALL THREE simultaneously.
5. Mesh Infrastructure
TreeChain operates a global mesh of servers across multiple continents. Any server can encrypt, and any server can decrypt โ without coordination.
5.1 Current Deployment
EU-Helsinki
api-eu.treechain.ai
US-Oregon
api-us.treechain.ai
APAC-Singapore
api-apac.treechain.ai
Global Edge
Render CDN
5.2 Mesh Properties
| Property | Description | Benefit |
|---|---|---|
| No Single Point of Failure | Any node can handle any request | Geographic redundancy |
| No Key Synchronization | Nodes don't need to communicate keys | Eliminates sync vulnerabilities |
| Instant Scalability | New nodes just need codebase + seeds | No key distribution delays |
| Partition Tolerance | Nodes work independently | Network splits don't break crypto |
5.3 Node Provisioning
When a new node joins the mesh:
- Deploy identical codebase (contains derivation algorithm)
- Provision master seeds via secure channel (one-time, out-of-band)
- Node is immediately operational โ no "key exchange" with other nodes
This is fundamentally different from traditional distributed systems where new nodes must receive keys from existing nodes or a central authority.
Verify This Yourself
Run the Cross-Mesh Integrity test: ๐ The Math โ Test 01. Encrypt on Helsinki, decrypt on Oregon. Watch the server labels โ no key ever travels between them.
6. Security Properties
6.1 What ZKE Defends Against
| Attack | Traditional Key Exchange | ZKE Architecture |
|---|---|---|
| Key Interception (Network) | Vulnerable during exchange | No keys on network |
| Key Server Compromise | All keys exposed | No central key server |
| Man-in-the-Middle | Possible without auth | Nothing to intercept |
| Replay of Key Exchange | Possible | No exchange to replay |
| Traffic Analysis (Key Patterns) | Key exchanges visible | No key traffic exists |
6.2 Security Assumptions
ZKE security depends on:
Assumption 1: Secure Deployment
The initial deployment of codebase and seeds to each node must be secure. If an attacker compromises a node at provisioning time, that node is compromised. This is the same assumption all systems make about initial setup.
Assumption 2: Node Integrity
Each node must maintain integrity of its codebase and seed storage. If an attacker gains root access to a node, they could extract seeds. Defense: HSMs, secure enclaves, intrusion detection.
Assumption 3: Algorithm Secrecy (Defense-in-Depth)
While security does not depend on algorithm secrecy (per Kerckhoffs), keeping the derivation algorithm private adds an additional barrier. This is defense-in-depth, not security-through-obscurity.
6.3 Cryptographic Foundation
ZKE is built on proven cryptographic primitives:
- Encryption: ChaCha20-Poly1305 (256-bit AEAD)
- Key Derivation: HMAC-based (details redacted)
- Randomness: CSPRNG for provenance generation
We do not claim any novel cryptographic primitives. The innovation is architectural โ how these primitives are combined and deployed โ not mathematical.
7. Empirical Validation
We validate ZKE properties through live testing against production infrastructure.
7.1 Cross-Mesh Decryption Test
Test Procedure
Encrypt plaintext P on Server A. Send only the ciphertext C to Server B (where B โ A). Decrypt on Server B. Verify output matches original plaintext P.
| Metric | Target | Observed | Status |
|---|---|---|---|
| Decryption Success Rate | 100% | 100% | PASS |
| Output Match Rate | 100% | 100% | PASS |
| Round-Trip Latency | < 1000ms | ~300-500ms | PASS |
7.2 Key Independence Verification
We verify that keys are derived independently (not transmitted) by examining network traffic:
- Packet capture shows only ciphertext between servers
- No key material, key identifiers, or key negotiation messages
- Each server's key derivation is purely local computation
7.3 Stochastic Output Verification
We verify that provenance includes sufficient randomness:
- Same plaintext encrypted twice produces different ciphertext
- Both ciphertexts decrypt correctly on any server
- Proves: provenance is unique per encryption, but derivation is consistent
Run These Tests Yourself
All validation tests are available at ๐ The Math. Test 01 (Cross-Mesh) and Test 02 (Stochastic Non-Determinism) directly validate ZKE properties.
8. Comparison to Existing Approaches
8.1 vs. Traditional Key Exchange
| Aspect | Diffie-Hellman / RSA | ZKE |
|---|---|---|
| Key Material on Network | Yes (public keys, DH values) | No |
| Requires PKI | Yes (for authentication) | No |
| Requires Coordination | Yes (handshake) | No |
| Adding New Nodes | Certificate issuance, key distribution | Deploy code + seeds |
8.2 vs. Distributed Key Generation (DKG)
| Aspect | DKG (Threshold) | ZKE |
|---|---|---|
| Key Shares Transmitted | Yes (during generation) | No |
| Requires Quorum | Yes (t-of-n) | No (any single node suffices) |
| Node Coordination | Required for key operations | Not required |
8.3 vs. Zero-Knowledge Proofs
Despite the similar name, ZKE is distinct from Zero-Knowledge Proofs (ZKP):
- ZKP: Prove knowledge of a secret without revealing the secret
- ZKE: Derive keys independently without exchanging key material
These are complementary, not competing, techniques. TreeChain could incorporate ZKP for authentication while using ZKE for key derivation.
8.4 What ZKE Is NOT
- Not a new cryptographic primitive: We use standard, proven algorithms
- Not homomorphic encryption: We don't compute on encrypted data
- Not quantum-resistant (inherently): Post-quantum security comes from the underlying primitives, not the architecture
- Not trustless: You must trust that nodes were provisioned correctly
9. Limitations & Threat Model
9.1 What ZKE Does NOT Protect Against
| Threat | ZKE Protection | Mitigation |
|---|---|---|
| Compromised Node (Root Access) | No | HSMs, secure enclaves, monitoring |
| Malicious Insider (Deployment) | No | Access controls, audit logs |
| Endpoint Compromise (Client) | No | Client-side security |
| Side-Channel Attacks | No | Constant-time implementations |
| Social Engineering | No | Training, policies |
9.2 Trust Boundaries
ZKE assumes:
- Trusted: TreeChain's deployment process, node operators, codebase integrity
- Untrusted: Network between nodes, storage systems, clients
If you don't trust TreeChain's infrastructure, ZKE provides no additional security over traditional encryption. The benefit is in eliminating network-based key attacks, not in eliminating trust entirely.
9.3 Operational Considerations
Seed Rotation
Rotating master seeds requires coordinated redeployment to all nodes. During transition, both old and new seeds may need to be active. This is an operational complexity that traditional key exchange doesn't have.
Seed Backup
If all nodes lose their seeds simultaneously (catastrophic failure), data encrypted with those seeds is unrecoverable. Secure, distributed seed backup is essential.
10. Honest Claims
10.1 What We Claim
- ZKE eliminates key material from network transit between encryption and decryption operations
- Any node in our mesh can decrypt ciphertext produced by any other node
- No inter-node communication is required for key derivation
- The architecture reduces attack surface compared to traditional key exchange
- Underlying cryptographic primitives (ChaCha20-Poly1305, HMAC) are industry-standard
10.2 What We Do NOT Claim
- ZKE is not a replacement for all key management โ initial seed distribution still requires secure channels
- ZKE does not provide "trustless" security โ you must trust our infrastructure
- ZKE is not a novel cryptographic primitive โ the innovation is architectural
- ZKE does not protect against compromised nodes โ defense-in-depth is still required
- We do not claim to be "the first" to derive keys from embedded data โ we claim a specific, production-ready implementation for distributed mesh decryption
Our Philosophy
We believe that honest disclosure of capabilities and limitations builds more trust than inflated claims. ZKE solves a real problem โ network-based key attacks โ without pretending to solve all problems.
๐ Verify Our Claims
Every claim in this whitepaper can be tested against our live infrastructure.
Appendix A: Redacted Sections
The following details are intentionally omitted from this public document:
| Section | Reason for Redaction |
|---|---|
| Provenance Field Structure | Defense-in-depth; reduces attacker knowledge |
| Key Derivation Function Details | Core proprietary implementation |
| Seed Generation Process | Operational security |
| Glyph Mapping Algorithm | Steganographic layer details |
| Inter-layer Key Independence | Defense-in-depth architecture |
Per Kerckhoffs's principle, security does not depend on the secrecy of these details. However, their disclosure would reduce defense-in-depth without providing commensurate benefit to legitimate users or security researchers.
Security researchers who wish to examine these details under NDA may contact security@treechain.ai.
References
- Diffie, W. & Hellman, M. (1976). "New Directions in Cryptography." IEEE Transactions on Information Theory.
- Kerckhoffs, A. (1883). "La cryptographie militaire." Journal des sciences militaires.
- Bernstein, D.J. (2008). "ChaCha, a variant of Salsa20." Workshop Record of SASC 2008.
- IETF RFC 8439 (2018). "ChaCha20 and Poly1305 for IETF Protocols."
- Pedersen, T. (1991). "A Threshold Cryptosystem without a Trusted Party." EUROCRYPT '91.
- Boneh, D. & Franklin, M. (2001). "Identity-Based Encryption from the Weil Pairing." CRYPTO 2001.
- NIST SP 800-57 (2020). "Recommendation for Key Management."
๐ Continue Your Session
You've read about Zero-Key-Exchange. Now see it in action.
The Math
Run the Cross-Mesh test and watch data encrypt on Helsinki, decrypt on Oregon โ with zero key transmission.
Live VerificationBreak This Challenge
Think you can intercept a key that doesn't exist? Prove it and claim bounties up to 100,000 ๐ณ.
$100K+ BountiesEnterprise Demo
Experience the full Three-Layer Fortress with ZKE-powered cross-mesh decryption.
InteractiveQuestions? security@treechain.ai ยท Enterprise inquiries? sales@treechain.ai
Take the Break This Challenge
Prove you can crack TreeChain encryption and claim the 100,000 TREE bounty.
See the Cryptographic Proofs
NIST-based statistical tests running against live production servers.