InterLayer Security
Future-proof security with NIST-standard post-quantum signatures and optional ZK verification gates.
Core Security Architecture
Post-Quantum
Dilithium and Falcon signatures for governance and critical operations.
ZK Gates
Optional zero-knowledge proofs for sensitive cross-VM calls.
BLS Threshold
Validator signatures aggregated via BLS for efficient consensus.
Post-Quantum Cryptography
InterLayer uses NIST-standard post-quantum signatures for governance and high-value transactions, ensuring security against future quantum computers.
CRYSTALS-Dilithium
Lattice-based signature scheme. Used for governance proposals, chain upgrades, and treasury operations.
CRYSTALS-Falcon
Compact lattice-based signatures. Used for validator rotation and critical consensus messages.
ZK Verification Gates
Optional zero-knowledge proofs for privacy-sensitive operations. Ideal for confidential asset transfers, private voting, and sensitive cross-VM calls.
ZK-SNARKs
Groth16 and PLONK circuits for compact proofs. Integrated into MEL transaction capabilities.
Privacy-Preserving Calls
Cross-VM calls can include ZK proofs to hide amounts, recipients, or contract logic while maintaining verifiability.
Verifiable Compute
Off-chain computation with on-chain verification. Reduce gas costs for complex operations.