Trust Infrastructure for Business

Collaborate Across Boundaries. Control Every Disclosure.

When organisations share sensitive data — purchase orders, patient records, credentials, compliance reports — they rely on trust, email, and hope. Sorcha replaces hope with cryptographic proof.

7+ Crypto Algorithms
7 Microservices
2700+ Tests Passing
8 Open Standards
Supply Chain Workflow
1 Submit Order
2 Verify & Sign
3 Confirm
Selective Disclosure
Buyer sees: Item Qty
Seller sees: Item Price
The Opportunity

You Already Share Sensitive Data Across Boundaries

Purchase orders, patient referrals, compliance reports, credentials — your most valuable data crosses organisational lines every day. What if every exchange was provable, private, and permanent?

How data moves between organisations today
Your Organisation
Who sees what?
Partner
Did they change it?
Regulator
The same journey, with Sorcha
Your Organisation
Selective disclosure
Partner
Signed & immutable
Regulator
Data gets shared more broadly than intended

You send a spreadsheet to a partner. They only need three columns, but they can see all twenty. Every forwarded email, every shared drive link — it widens the exposure.

Field-level disclosure means each party sees only their authorised view. The data itself enforces the boundary — not a policy document.
You can't prove who changed what, or when

A supplier disputes the terms. A regulator asks for the original. Version control says "last modified by: unknown". The audit trail is a folder of attachments with no chain of custody.

Every action is cryptographically signed by the participant's wallet and hash-linked into an immutable chain. The maths proves it.
Records disappear when you need them most

A server fails. A retention policy expires. A departing employee deletes a mailbox. The records you need for a dispute, an audit, or a compliance review are gone — and no one noticed until it mattered.

Peer-to-peer replication across the network means records are immutable and distributed. No single failure can destroy them.
Business Outcomes

Why Organisations Choose Sorcha

Four guarantees that transform how you collaborate across organisational boundaries.

Provable Actions

Every action signed. Every claim verifiable.

Participant wallets cryptographically sign every transaction. You can prove exactly who did what, when, and what data they submitted — no he-said-she-said disputes.

Privacy by Design

Share what's needed. Nothing more.

JSON Schema-driven selective disclosure ensures each participant sees only the fields they need. A buyer sees product and quantity. A supplier sees product and price. Neither sees the other's sensitive data.

Tamper-Proof Records

No one can rewrite history.

SHA-256 chain-linked transactions sealed into dockets. Validator consensus before finalization. Any attempt to alter a record breaks the chain and triggers detection.

Resilient by Default

Data survives because the network does.

Peer-to-peer replication means no single point of failure can destroy records. If one node goes down, others maintain the complete ledger. No vendor lock-in, no central authority.

How Sorcha Protects You

The DAD Security Framework

Three pillars that address the three ways data is compromised in multi-party processes: unwanted exposure, undetected changes, and permanent loss.

Disclosure

Every party sees only what they should

JSON Schema-driven selective disclosure controls exactly which fields each participant can access. SD-JWT Verifiable Credentials enable selective claim presentation without revealing your full identity.

  • Field-level access control via JSON Pointers (RFC 6901)
  • Schema-validated data at every step
  • Zero-knowledge proofs for privacy-preserving audits

Alteration

Every change is permanent and provable

All actions are cryptographically signed by participant wallets and hash-linked into an immutable chain. You cannot alter history without detection — the maths won't allow it.

  • SHA-256 chain-linked transactions with docket sealing
  • Hybrid classical + post-quantum signatures
  • Validator consensus before finalization

Destruction

Data survives because the network does

Peer-to-peer replication across the network means no single point of failure. If one node goes down, others maintain the complete ledger state with automatic sync and recovery.

  • gRPC gossip protocol for efficient replication
  • Automatic sync and recovery for offline nodes
  • Bloom filter deduplication prevents flooding
Open Trust Frameworks

Built on Standards You Can Verify

Not a proprietary black box. Sorcha implements internationally recognised standards so your data and credentials are portable, verifiable, and future-proof.

EU Regulation

eIDAS 2.0 Ready

Issue and verify electronic attestations aligned with the European Digital Identity framework for cross-border recognition.

IETF RFC 9449

SD-JWT Verifiable Credentials

Selective Disclosure JWTs allow holders to present only the claims needed — prove you're qualified without revealing your full transcript.

W3C Specification

Decentralized Identifiers

Self-sovereign did:sorcha identifiers give every wallet a globally resolvable identity without a central authority.

Bitcoin Standard

BIP32 / BIP39 / BIP44

Hierarchical deterministic wallets derived from a single seed phrase. Create unlimited addresses from one recovery phrase.

NIST / FIPS

FIPS 186-4 & 180-4

Government-grade cryptography: NIST P-256 for signing, SHA-256 for hashing, AES-256-GCM for encryption at rest.

NIST / CNSA 2.0

FIPS 203, 204 & 205

Post-quantum cryptography deployed today: ML-DSA-65 signatures, ML-KEM-768 key encapsulation, SLH-DSA-128s hash-based signatures.

Future-Proof Your Records

Quantum-Safe by Design

Records you create today must survive threats that don't exist yet. Sorcha's CNSA 2.0 compliant cryptography protects against both current and future quantum computer attacks.

Hybrid Signing

Classical + PQC dual signatures. Protected today by proven algorithms and tomorrow by quantum-resistant ones — simultaneously.

Post-Quantum Encryption

ML-KEM-768 key encapsulation with AES-256-GCM. Confidential payloads stay confidential even against future quantum computers.

Threshold Signatures

BLS12-381 t-of-n distributed validation. No single validator holds the complete signing key — consensus requires a threshold of participants.

Zero-Knowledge Proofs

Pedersen commitments with Schnorr proofs. Auditors verify transaction properties without seeing underlying data.

CNSA 2.0 Compliant · FIPS 203/204/205 · NIST Level 3 · Per-Register Crypto Policy
Real-World Applications

Where Trust Meets Workflow

Any process involving multiple organisations, sensitive data, and the need for an auditable record is a fit for Sorcha.

Healthcare

The problem: Sharing patient data between providers, insurers, and labs creates liability. Consent is hard to enforce. PHI breaches are costly.
How Sorcha helps: Field-level encryption and schema-controlled access ensure only authorised parties see protected health information. Consent is enforced by the workflow, not by policy alone.
Data Privacy Consent Enforcement HIPAA/GDPR Aligned

Financial Services

The problem: Settlement disputes, compliance reporting burden, and cross-border payment opacity drain resources and slow transactions.
How Sorcha helps: Immutable audit trail with cryptographic proof of every step. Regulators get read access to the trail without accessing transaction content via zero-knowledge proofs.
Immutable Records Regulatory Access Faster Settlement

Education & Credentials

The problem: Credential fraud is rampant. Verification is manual and slow. Sharing a transcript reveals far more than what's needed.
How Sorcha helps: SD-JWT Verifiable Credentials let graduates prove specific qualifications to employers without exposing their full academic record.
Verifiable Credentials eIDAS Aligned Selective Presentation

Government & Regulation

The problem: Paper-based processes, redundant paperwork across agencies, citizen data exposed to unnecessary parties.
How Sorcha helps: Digital attestations with quorum governance. Citizens present verifiable proofs to any service without re-submitting documents.
Governance Digital Identity Paperless

Consortium Operations

The problem: Industry groups need a shared record but no single entity should control it. Governance deadlocks stall progress.
How Sorcha helps: Decentralized register governance with quorum-based voting. Democratic control with no vendor lock-in or central authority.
Quorum Voting Decentralized No Lock-In
The Toolkit

Everything You Need to Orchestrate Trust

Your intellectual property lives in the blueprint. The platform handles the cryptography, the ledger, and the workflow execution.

AI Blueprint Builder

Describe your process. We'll build it.

Chat with the AI assistant to design workflows in natural language. It understands schema standards, disclosure patterns, and routing logic — and generates production-ready blueprints.

Visual Designer

Drag, drop, deploy.

For non-technical users: a visual workflow builder with live preview. Define actions, connect participants, set disclosure rules, and deploy directly to the ledger — no code required.

HD Wallets

Your identity. Your keys.

Hierarchical deterministic wallets with classical and post-quantum algorithm support. BIP32/39/44 compliant with quantum-safe ws2 Bech32m addresses alongside standard ws1 addresses.

Verifiable Credentials

Issue. Store. Present. Verify.

eIDAS-aligned SD-JWT credentials that gate workflow actions on credential proof. Chain credentials across multiple blueprints for complex multi-step processes.

Real-Time Collaboration

Know instantly when it's your turn.

SignalR-powered live notifications for action submissions, workflow progress, and transaction confirmations. Push notifications across all connected clients.

Workflow

From Design to Verification in Four Steps

01

Design Your Blueprint

Use the visual designer, AI chat, or JSON/YAML to define participants, actions, schemas, routes, and disclosure rules.

02

Publish to the Ledger

The blueprint is validated for correctness, cycle-free routing is confirmed, then it's published to a register. Participants are notified in real time.

03

Execute Actions

Each participant submits their data, signs with their wallet, and the engine validates, routes, and discloses — all in a single atomic operation.

04

Verify & Audit

Every step recorded on the immutable ledger. Verifiable credentials issued as proof. The full audit trail is always available to authorised parties.

Technology

Cloud-Native. Enterprise-Ready.

Built on .NET 10 with .NET Aspire orchestration. Seven microservices with full observability, health checks, and horizontal scaling.

.NET 10
LTS Runtime
Aspire
Orchestration
PostgreSQL
Relational Data
MongoDB
Document Store
Redis
Cache & Sync
gRPC
P2P Network
SignalR
Real-Time
Blazor
WASM UI
BouncyCastle
PQC Algorithms
Open Source

Built in the Open. MIT Licensed.

Sorcha is open source. Explore the code, file issues, read the API docs, or contribute to the platform.

Ready to Build Trust Into Your Workflows?

Design secure, multi-party processes with cryptographic guarantees and verifiable credentials — no blockchain expertise required.