Skip to content

Key Request Process

Overview

The Key Request Process is how users, institutions, or blockchain systems securely obtain dynamic encryption keys for data encryption, decryption, or transaction signing. Unlike traditional encryption models that rely on static private keys, QuStream generates a new encryption key for every request, ensuring post-quantum security and eliminating key reuse risks.

Every key request is processed through Validator Nodes & Encryption Nodes, ensuring privacy, decentralization, and scalability.


How the Key Request Process Works

1️⃣ Submitting a Key Request

  • A user (or system) submits a Key Request to the QuStream network.
  • This request can be made by:
    Blockchain participants (wallets, dApps, exchanges).
    Institutional clients (banks, enterprises, secure communication platforms).
    Web2/Web3 service providers (authentication layers, privacy-focused applications).
  • The request is broadcast to Validator Nodes for authentication and processing.

Learn More → QuStream Encryption Nodes


2️⃣ Request Validation & Fee Processing

  • Validator Nodes verify:
    ✅ The validity of the request (ensuring the requester is authenticated).
    ✅ The availability of funds (each request incurs a small QST fee).
    ✅ The device authorization (ensuring the request comes from an approved device linked to the user's ID).
  • Once validated, the request is sent to Encryption Nodes for processing.

Learn More → Authenticator App & Device Security


3️⃣ Encryption Key Generation via QRNG

  • Encryption Nodes use a Quantum Random Number Generator (QRNG) to generate a 2,097,152-bit random block (R).
  • This block is used as raw entropy for key generation.
  • The key is divided into 18 segments, randomly inserted within R.
  • A 40-bit suffix (P) containing key metadata is added and obfuscated using bitwise XOR operations.

Learn More → Quantum-Safe Cryptography


4️⃣ Secure Key Retrieval & Delivery

  • The modified block (R') is transmitted back to the user.
  • The user's device scans R' for its rUIDs, which indicate where its encryption key segments are stored.
  • The key is reconstructed based on the extracted segments, metadata, and ordering instructions.
  • Once the key is verified, it is used to encrypt, decrypt, or sign transactions.

Why QuStream’s Key Request Process is Secure?

No Static Private Keys – Each request generates a unique encryption key, preventing long-term exposure.
Quantum-Safe by Design – Uses true quantum randomness for unpredictable, one-time-use keys.
Decentralized Processing – Key generation is distributed across multiple Encryption Nodes, ensuring no single point of failure.
Privacy-Preserving – Even QuStream does not have access to full encryption keys, as they are randomly sharded across nodes.


Conclusion

The QuStream Key Request Process ensures that encryption keys are dynamically generated, securely distributed, and post-quantum resilient. By leveraging QRNG-based entropy, decentralized Encryption Nodes, and rUID authentication, QuStream provides a trustless and scalable solution for secure transactions, encrypted communications, and institutional-grade encryption services.


Next Steps