Why PQ signature + ZK audit

Post-quantum signatures and ZK audit proofs solve different problems. Use both only when your compliance model needs both authenticity and privacy-preserving attestations.

Back to API docs

What each layer does

LayerPrimary goalBest for
PQ signature (Dilithium)Authenticity and integrity with quantum-resistanceToken issuance, token verification, non-repudiation
ZK audit proofProve compliance facts without exposing sensitive internalsRegulated workflows, selective disclosure, audit trails

Decision guide

ScenarioRecommended stackReason
General API token verificationClassical + PQ hybrid signatureMigration-safe and legally compatible
High-assurance long-lived tokensPQ signature requiredFuture-proof against quantum attacks
Audit where business logic is sensitivePQ signature + ZK auditVerifiable evidence with privacy
Simple low-risk internal prototypeClassical only (temporary)Fast iteration before hardening

Practical rollout order

  1. Enable hybrid_required policy for production integrations.
  2. Move large signatures to JSON body or secure cookies (not headers).
  3. Publish performance numbers separately for native vs ZK stages.
  4. Add ZK audit only for controls that require privacy-preserving compliance proof.