Authentic by proof, not by promise

Encryption made digital interactions private. The next step: making them provably authentic.

See it in production

Vereign provides the authenticity layer that sits beneath existing infrastructure. Each organisation holds its own cryptographic identity and verifies counterparties directly — sovereign, auditable, and independent.

HIN — Health Info Net

800,000+

verified interactions per month

See the HIN use case

What breaks — and what becomes possible

Manual

Every cross-institutional verification in healthcare requires manual coordination — phone calls, faxes, portal logins. Direct bilateral verification eliminates the intermediary entirely.

CAQH Index 2023 · $30B annual administrative cost in US healthcare alone

Fragile

Banks depend on centralised trust chains for KYC and cross-institutional verification. When a single link fails, the entire chain breaks. Bilateral trust makes each verification independent and auditable.

EBA 2023 · EUR 6.5B annual ICT operational losses in European banking

O(n²)

39 European TSOs need 741 bilateral agreements under the current trust model. O(n) architecture means each new operator adds one relationship, not 38.

ENTSO-E analysis

What others say

I've spent 20 years building trust infrastructure. The biggest open question was always: who guarantees trust between organisations without becoming the bottleneck — and a target? Vereign has the answer.

Urs Fischer Urs Fischer Business Development & Innovation Manager, HIN, previously CEO, SwissSign

After nearly three decades of testing security assumptions, the fundamental flaw is clear: trust models based on perimeter defense break hard at the organizational walls. Vereign makes trust verifiable at the point of interaction where it's needed most.

Built for the trust gap

Product

Bilateral trust without a shared authority

Stargate — Stargate replaces centralised trust infrastructure with bilateral verification. Each organisation manages its own cryptographic identity — no certificate authority, no single point of failure. Verification is direct, scaling is O(n). In Swiss healthcare, Stargate is replacing 30 years of legacy gateway infrastructure.

Explore Stargate →
Product

Verified delivery to any device, zero installation

SEAL — SEAL (Secure Edge Application Layer) delivers encrypted, verified messages to any recipient on any device — no software to install, no accounts to create. Content is fragmented and distributed across an encrypted swarm so no single system holds the complete message.

Explore SEAL →
Perspective

Why the certificate authority model is broken

PKI and OAuth are correctly engineered for what they were designed for. They were not designed for multi-stakeholder, cross-institutional trust at scale. The Trust Architecture page explains the structural gap — and the mathematical case for why a different foundation is required.

Read the analysis →

One architecture. Eight regulated sectors.

Healthcare

In production

800,000+ verified interactions per month across Swiss healthcare since April 2025

See the healthcare deployment →

Cybersecurity

In production

Verified delivery of sensitive security findings — penetration test reports with cryptographic proof of authenticity via SEAL

See cybersecurity delivery →

Finance

Architecture validated

GLEIF-validated bilateral trust — designed for KYC, AML, and cross-institutional verification

Explore finance architecture →

Defence

Architecture validated

Designed for zero-trust bilateral verification in classified inter-agency data exchange

See defence verification →

Pharma

Architecture validated

Designed for verifiable chain of custody across clinical trial data and regulatory submissions

See pharma chain of custody →

Energy

Architecture validated

Designed for authenticated mesh networking between grid operators — O(n) trusted inter-TSO communication

See energy grid architecture →

Legal

Architecture validated

Designed for verifiable document provenance across borders. Secure client communication without apps or onboarding.

See legal document provenance →

Compliance

Architecture validated

Designed for auditable, attribution-complete records meeting DORA, GDPR, and NIS2 obligations — NIS2 enforcement begins June 2026

See compliance architecture →

Trust infrastructure as competitive advantage

Organisations that control their own trust infrastructure onboard partners faster, negotiate from strength, and operate across jurisdictions without third-party dependency. Dataspaces and cross-organisational workflows become viable when trust is bilateral — not brokered through a shared authority. DKMS is the Certificate Authority at the Edge: each organisation becomes its own root of trust, mapping real organisational complexity into cryptographic infrastructure.

See how the architecture works
30 years building cryptographic infrastructure Federal Cross of Merit on Ribbon 800,000+ verified interactions in Swiss healthcare Open source, AGPLv3+ Meet the team →
Trusted by
Hin Ibm Dhi Redhat Ehda Cyberware Dkms alliance Daasi Dif

Ready to build trust infrastructure that scales?

Whether you are evaluating trust architecture for your organisation or exploring partnership opportunities, we will show you how the technology applies to your specific context.

Swiss Data Protection GDPR Compliant Open Source AGPLv3+ Swiss Hosting