⛓ Infrastructure

The Stack Behind
Everything.

CloudVault, post-quantum cryptography, permissioned L1 blockchain, unified L2, MPC signing, ZK proofs, and TEE compute — engineered together as a single coherent trust system.

The Trust Foundation

CloudVault is the distributed policy, governance, and security backbone of Maithraa. It never stores private keys. It never signs transactions. It only asks one question: "Is this allowed?"

🏛️

3Shared Auth

User + Device + Cloud — three independent factors, zero single-point-of-failure

🌐

Multi-Cluster MPC

IN · UAE · EU · US nodes. 3-of-5 threshold signing. DKG + re-sharing policies

⚖️

Policy Engine

Identity, device, SIM, jurisdiction, and risk — deterministic rule evaluation on every intent

🔒

Zero-PII Audit

Merkle-batched audit logs anchored to L1. Compliance without exposing personal data

📱

SIM-Binding

India-mandatory SIM identity verification. SIM-swap detection and IMSI/MSISDN hashing

🛡️

Device Attestation

TEE, Secure Enclave, StrongBox attestation. Device Fingerprint Hash, drift detection

L1 + L2 — Built Together

L1 — Root of Trust

Maithraa L1

Permissioned Layer-1 with PoA + BFT hybrid consensus. Rust-only deterministic runtime. Identity-bound validator network.

Dilithium5 Validator Signatures
Parallel Execution Engine
Sharding Model
CBDC Mint/Burn System
Full MRC Token Suite
Treasury + Governance
L2 — High-Throughput

Unified L2

Single unified L2 framework with shared security, governance, and data availability — under L1 oversight and finality.

Dilithium3 Sequencer Signatures
Multi-Sequencer Model
Validity + Hybrid Rollup
ZK Batch Proofs
L2 ↔ L1 Checkpointing
Data Availability Layer

Advanced Cryptographic Infrastructure

🔑

MPC Network

Multi-Party Computation nodes hold key shares in memory only. Threshold signing requires quorum approval. No single node ever holds a complete key.

t-of-n Threshold DKG Protocol Re-sharing
🔭

ZK Proofs

SNARK/Plonk/Halo2 validity proofs for shielded pools, confidential transactions, ZK-identity, and AML-compatible privacy. L2 batch ZK proofs for efficiency.

Plonk / Halo2 ZK-Identity Shielded Pools
🔬

TEE Compute

Trusted Execution Environments (SGX/SEV/TrustZone) for confidential AML, AI analytics, and on-chain result anchoring. Remote attestation for integrity proofs.

Intel SGX AMD SEV TrustZone

The Full Layer Model

User Wallet
Mobile Primary · Desktop Mirrored · Browser Extension
↓ Intent Creation
API Gateway
Auth Middleware · Rate Limit · Schema Guard · Device Validation
↓ Intent Request
CloudVault Core
Identity · Session · Policy Engine · Runtime Risk · SIM Binding
↓ Policy Evaluation
Compliance Infrastructure
AML · Sanctions · Jurisdiction · Asset Registry · Regulatory Safe Mode
↓ Authorized Intent
MPC Network
Dilithium5 · Threshold Signing · Distributed Key Shares · DKG
↓ Signed Transaction
L2 → L1 Network
Execution · State Updates · Anchoring · Global Settlement · Finality