ADD-IN FOR CLOUDHSM
Crypto Extension
Easily secure your cryptocurrency operations in the cloud
Expand the capabilities of CloudHSM Economy with an extension supporting cryptocurrency algorithms used for Bitcoin, Ethereum, Ripple, IOTA, Cardano, etc. Securely and easily integrate your crypto wallet applications using industry-standard APIs.
How it works
Benefits and features
Create custom rules & conditionsCloudHSM Blockchain comes with a policy engine to implement customizable rules and conditions governing various aspects of your blockchain transactions and smart contract execution. You can enforce specific requirements, such as access control, spending limits, or transaction validation criteria, within the blockchain ecosystem. |
Manage keys efficientlyCreate hierarchical deterministic wallets using BIP-32 key derivation, allowing the creation of a tree-like structure of cryptographic keys derived from a single master key. This enables efficient key management and simplifies backup and restoration processes. |
Derive keys with elliptic curve cryptographyCloudHSM Blockchain supports all cryptocurrencies that utilize cryptographic algorithms such as Secp256k1 (used in Bitcoin) and Ed25519 (used in some other cryptocurrencies). These algorithms are widely used for generating cryptographic keys and signatures in blockchain networks. |
Derive private & public key pairs of curve with SLIP-0010CloudHSM Blockchain can create deterministic multisignature walleters. It provides a method for deriving a hierarchy of keys for use in multisignature schemes, enhancing security and flexibility in managing funds. |
Protect your public keyCloudHSM Blockchain ensures that the public key associated with a specific address is not revealed until a signature is produced. This adds an extra layer of privacy & security to transactions, as the public key is typically used to verify signatures. |
Powerful access controlCloudHSM Blockchain provides the multi-person "M of N" protocol to implement multisignature schemes where multiple signatures are required to authorize a transaction. "M of N" refers to the requirement of obtaining signatures from at least M out of N possible signatories to validate a transaction. This enhances security by distributing control over funds among multiple parties. |
Geo-redundant locationsYour HSMs remain accessible even in the event of an elementary damage. They are mirrored at 3 geographically separate locations, one of them located in an underground data center total shielding against electromagnetic pulses (EMP/HMP, BSI zone 3 / NATO zone 2). |
|
Related services
CloudHSM Certified
A managed service using certified hardware & software.
CloudHSM Sandbox
A managed service providing a pre-production environment, the ideal for testing & proof-of-concepts. Easily integrate with your applications using industry-standard APIs.