Blockchain
CloudHSM Blockchain
Easily secure your cryptocurrency operations in the cloud
CloudHSM Blockchain combines CloudHSM Economy with a license for cryptocurrency algorithms used for Bitcoin, Ethereum, Ripple, IOTA, Cardano, etc. You can securily and easily integrate with your crypto wallet applications using industry-standard APIs.
How it works
Benefits and features
Create custom rules & conditionsCloudHSM Blockchain comes with a policy engine to implement customizable rules and conditions governing various aspects of your blockchain transactions and smart contract execution. You can enforce specific requirements, such as access control, spending limits, or transaction validation criteria, within the blockchain ecosystem. |
Manage keys efficientlyCreate hierarchical deterministic wallets using BIP-32 key derivation, allowing the creation of a tree-like structure of cryptographic keys derived from a single master key. This enables efficient key management and simplifies backup and restoration processes. |
Derive keys with elliptic curve cryptographyCloudHSM Blockchain supports all cryptocurrencies that utilize cryptographic algorithms such as Secp256k1 (used in Bitcoin) and Ed25519 (used in some other cryptocurrencies). These algorithms are widely used for generating cryptographic keys and signatures in blockchain networks. |
Derive private & public key pairs of curve with SLIP-0010CloudHSM Blockchain can create deterministic multisignature walleters. It provides a method for deriving a hierarchy of keys for use in multisignature schemes, enhancing security and flexibility in managing funds. |
Protect your public keyCloudHSM Blockchain ensures that the public key associated with a specific address is not revealed until a signature is produced. This adds an extra layer of privacy & security to transactions, as the public key is typically used to verify signatures. |
Powerful access controlCloudHSM Blockchain provides the multi-person "M of N" protocol to implement multisignature schemes where multiple signatures are required to authorize a transaction. "M of N" refers to the requirement of obtaining signatures from at least M out of N possible signatories to validate a transaction. This enhances security by distributing control over funds among multiple parties. |
Geo-redundant locationsYour HSMs remain accessible even in the event of an elementary damage. They are mirrored at 3 geographically separate locations, one of them located in an underground data center total shielding against electromagnetic pulses (EMP/HMP, BSI zone 3 / NATO zone 2). |
|
Related services
CloudHSM for Amazon Web Services (AWS)
A managed service with an External Key Store (XKS) Proxy to be integrated with Amazon Web Services (AWS).
CloudHSM Economy
A fully managed HSM service that integrates with your applications using industry-standard APIs, such as PKCS#11, Java Cryptography Extension (JCE), and Microsoft CryptoNG (CNG) libraries.
CloudHSM Sandbox
A managed service providing a pre-production environment, the ideal for testing & proof-of-concepts. Easily integrate with your applications using industry-standard APIs.
Getting started
Pricing
You pay a monthly fee for each active HSM in your account and for the blockchain license. Rates vary by region. You can view these at