Scytale specialises in developing advanced cryptography, electronic signature and authentication solutions based on a blockchain protocol.
We have been operating in the blockchain sector for years and this is where SignChain was created, an advanced blockchain-based electronic signature platform that is compliant with the eIDAS regulation.
This platform associates a single cryptographic identity with a set of private keys (which have been saved, are always verifiable and transparent) on a blockchain, i.e. a trusted third party.
It is as if a document signed with SignChain had been signed before a virtual notary who guarantees its integrity, unalterability and provability that it certainly existed on the date it was signed.
In a nutshell, the document has been ‘notarised’.
Smart Contracts are the equivalent of traditional contracts, converted into software code and automated: this all allows you to automatically check certain conditions, self-execute actions or give instructions so that certain actions can be performed, when the conditions determined between parties have been met and verified.
A Smart Contract is based on a code that ‘reads’ both clauses that have been agreed and the operating conditions in which the agreed conditions must occur and is executed automatically when the data referring to real situations matches the data referring to the agreed conditions and clauses.
The SighChain solution supports simple electronic signatures and advanced electronic signatures. Plus, it can be used to sign any kind of document or transaction.
What makes our solutions unique and why they differ from solutions previously used.
Post-quantum proof technology is used to create a set of keys that can be tracked back directly to the owner. As these are one-shot keys, they prevent phishing attempts, man-in-the-middle attacks and the like.
Authentication system based on the device's own keys: every transaction is signed, thereby guaranteeing greater security and innovation compared to OTP-based solutions.
The solution is integrated and can be integrated with document and process management systems.
Every public key used for an authentication is registered on the blockchain. If the same key is used twice, the authentication request is rejected, followed by the issue of an event shared with the network. The tampering attempt is shared with all those using the service and the police (Italian Postal and Communications Police, Financial Police, etc.).