Skip to content

Integration: encrypted transport for attestation-verified agents #2

@vessenes

Description

@vessenes

Encrypted transport for attestation-verified agents

Context: The Open Agent Trust Registry verifies who issued an agent's identity badge using Ed25519 signatures. qntm provides E2E encrypted messaging between agents using the same Ed25519 key type. The combination closes the full chain: verify the agent's identity → encrypt their communications.

The integration:

The registry's attestation flow already establishes an Ed25519 public key for each verified issuer. qntm can use that same key material:

  1. Registry resolves issuer's Ed25519 public key (from manifest.json or issuer entry)
  2. Derive X25519 encryption key via birational equivalence (RFC 7748 §4.1) — same Ed25519 key, no new key material
  3. Establish encrypted channel using qntm's relay (HKDF key derivation, XChaCha20-Poly1305 AEAD, CBOR envelope)
  4. Transport-layer enforcement — the relay is untrusted (can't read ciphertext), attestation proves the other end is registry-verified

This means: if an agent can prove its identity through your registry, it can immediately establish an encrypted channel to any other verified agent without any additional key exchange infrastructure.

What exists today:

Alignment with your principles:

  • Your Ed25519 key material works directly with qntm (no new crypto primitives)
  • Threshold governance (3-of-5) maps to qntm's m-of-n API Gateway
  • Zero-trust mirror model aligns with untrusted relay model — neither the mirror nor the relay can tamper with what they carry
  • Verify locally + encrypt in transit = complete trust chain

Your registry verifies identity at rest. qntm encrypts identity in transit. Together they compose into a full trust stack for the agent internet.

Would be interested to explore whether registry-verified issuers could use qntm channels for attestation distribution, revocation announcements, or direct inter-issuer coordination.

pip install qntm / Docs / 261 tests, 0 failures.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions