PhoenixSig is a post-quantum digital signature system with Post-Compromise Security (PCS). Unlike traditional signature schemes, PhoenixSig is designed to recover automatically after key compromise — without human intervention, network connectivity, or certificate revocation.
PhoenixSig is not a replacement for NIST PQC algorithms. It uses ML-DSA or SLH-DSA as its signing engine and adds the lifecycle management layer on top. Think of it as: PQC provides the cryptographic strength; PhoenixSig provides the operational resilience.
Every digital signature scheme today — classical or post-quantum — assumes the private key stays secret for its entire lifetime. When that assumption breaks (and it will, eventually), the only response is manual key revocation, which is slow, unreliable, and requires network connectivity.
PhoenixSig eliminates this assumption. It treats compromise as an expected event and engineers recovery into the system itself.
PhoenixSig doesn’t use long-lived private keys. Instead:
The verifier doesn’t need to know every epoch key. All epoch public keys are committed to a Merkle tree during setup. Each signature includes the epoch public key plus a Merkle authentication path. The verifier only needs the tree’s root public key (RootPK) to verify any signature.
Suppose an attacker captures your device’s complete state — memory, storage, everything — at time t. With any other signature scheme, they can forge signatures indefinitely.
With PhoenixSig, after the next Phoenix refresh:
This is Post-Compromise Security: the system heals itself after breach, automatically and without external help.
Ready to go deeper? Here are the recommended next reads: