Enhance the level of your Crypto Asset security with

Hokan’s Threshold Signature Scheme

Next Generation Security

Using Threshold Signature Schemes means that an agreed number of parties must collaborate to create and use the keys. This ensures no single party has control over the assets. Hokan was designed to leverage TSS, in order to keep accounts secure from fraudulent activity and the loss of private keys.

After a registration phase, in which agreed parties are involved in the creation of the public key and the associated address, signatories use their personal “private share” to sign a transaction. The transaction is only valid if at least n (the threshold) of m (the actors) have signed.

  • NO individual OWNS THE PRIVATE KEY – THE PRIVATE KEY DOES NOT EXIST, ONLY M number of PRIVATE SHARES
  • THERE IS NEVER A SINGLE KEY for AN ATTACKER to EXPLOIT
  • MULTIPLE SIGNATURES ARE REQUIRED to authorise a TRANSACTION

No single Private Key

There is no single private key and the risk associated with its custody is distributed between parties. By implementing a TSS protocol Hokan, uses multi party computation do distribute secrets between n parties in order to remove a single point of attack.

Shared key and responsibility, means decentralised security

All crypto transactions are permitted only with the approval of a set amount of authorised people. Our system is based on distributed and decentralised keys bound together by an n–of–m authorisation systems that guarantees security and shared responsibility. No single entity has control of the crypto assets.

Enhanced security, optimal usability

Each element of the platform has been designed to be secure with a customer centric approach. Strong Authentication, Integrated KYC / AML features and Multi-approval schemes are just some of the features which make Hokan the safest crypto custodial platform.

Other features

  • 01. Withdrawals require Multi-sig authorization
  • 02. Built-in full auditing and reporting
  • 03. Leverages a Fully Secure encrypted OS
  • 04. Multichain platform

  • 05. Dedicated support
  • 06. Cloud & On-premises
  • 07. Mandatory 2FA
  • 08. High security hardware key

Contact us