AgentPMT
Quantum-Safe File Attestation

Quantum-Safe File Attestation

Function

Available ActionsEach successful request consumes credits as outlined below.

attest_artifact25crverify_attestation5crget_public_key5cr

Details

Issue formally verified, post-quantum cryptographic attestation certificates for any file. Every attestation is backed by a proof-carrying certificate bundle whose acceptance logic is proven correct in Lean 4. Signing uses ML-DSA-65 from the NIST post-quantum standard, executed through PQClean standardized runtimes with the private key secured in a hardware security module. A 4-check verification pipeline confirms signature validity, manifest consistency, artifact integrity, and certificate Merkle-tree integrity — all must pass. Anyone can verify certificates independently using the open-source offline verifier. No trust in our infrastructure required.

Use Cases

Sign software releases with formally verified post-quantum cryptography, Create proof-carrying attestation certificates with Lean 4 verified acceptance kernels, Verify file integrity with NIST-standardized ML-DSA-65 digital signatures and PQClean runtimes, Generate compliance evidence for SOC 2 SOX HIPAA and regulatory audits with cryptographic proof chains, Timestamp and cryptographically attest intellectual property artifacts with tamper-evident CAB bundles, Verify software supply chain integrity with 4-check verification pipeline, Issue verifiable certificates for code repositories and release archives backed by formal proofs, Provide independent verification keys for third-party auditors and partners, Create provenance records for AI model weights and training data with quantum-safe signatures, Attest firmware images and embedded software updates with hardware-backed signing, Notarize documents with post-quantum signatures backed by information-theoretic security foundations, Sign configuration files and infrastructure-as-code with formally verified cryptographic protocol stack

Connect Your Agent In 5 Min

Watch the setup guide for your platform

Or Install Locally

STDIO connector for Claude Code, Codex, Cursor, Zed, and other LLMs that require STDIO or custom connections. This lightweight connector routes requests to https://api.agentpmt.com/mcp. All tool execution happens in the cloud and the server cannot edit any files on your computer.

npm install -g @agentpmt/mcp-routeragentpmt-setup

About this Product

How It Works

Upload a file and receive a cryptographic attestation package that mathematically proves what the file contained at the moment it was signed. The attestation binds your file's SHA-256 hash, a timestamp, and any metadata you provide into a signed manifest using ML-DSA-65 (Dilithium3 / FIPS 204).

Formally Verified Acceptance Kernel

Unlike conventional code-signing tools where the verification logic is tested but not proven, every attestation includes a Carried Algebraic Bundle (CAB) whose acceptance kernel has been formally verified in Lean 4. The verification logic is mathematically proven correct — not just tested against known inputs. The kernel includes a verified C implementation extracted directly from the Lean 4 proof source.

Proof-Carrying Certificate Bundles

Each attestation package contains a CAB bundle that cryptographically binds three elements into a single tamper-evident envelope: the artifact hash, the proof commitment, and the manifest signature. The bundle includes a Merkle tree over all verification artifacts (kernel source, provenance metadata, and expected outputs), ensuring that any modification to any component is detectable.

4-Check Verification Pipeline

Every verification — whether through the hosted API or the standalone offline verifier — runs four independent checks that must all pass for acceptance:

  1. Signature validity — the ML-DSA-65 signature over the canonical manifest is cryptographically correct
  2. Manifest consistency — the package ID matches the SHA-256 of the canonical manifest bytes
  3. Artifact integrity — the file's SHA-256 matches what was recorded in the signed manifest
  4. CAB certificate integrity — the Merkle tree over all bundle artifacts verifies against the committed root

NIST PQC Parameter Coverage

The underlying VerifiedPQC protocol stack supports all 6 NIST post-quantum parameter sets: ML-KEM-512, ML-KEM-768, ML-KEM-1024 for key encapsulation, and ML-DSA-44, ML-DSA-65, ML-DSA-87 for digital signatures. The attestation service uses ML-DSA-65 (security level 3) for signing, backed by PQClean reference implementations — real, audited, standardized byte-level runtimes, not toy cryptography.

Hardware Key Protection

The ML-DSA-65 signing key is provisioned inside a Google Cloud KMS hardware security module. The private key never leaves the HSM — signing requests are sent to KMS, which returns the signature. Even if the service infrastructure were fully compromised, the signing key cannot be extracted. Every signing operation is logged by Google Cloud for audit purposes.

Security Foundations

The security model draws on information-theoretic foundations including privacy amplification and the leftover hash lemma. Constructive hardness guarantees are backed by contextuality-based impossibility proofs for the underlying lattice assumptions. These are not just computational security claims — the protocol stack includes formally verified components with mathematical correctness proofs.

Independent Verification

Attestation certificates can be verified without any connection to this service. The open-source standalone verifier is available at github.com/Abraxas1010/verified-pqc-verifier. It includes the ML-DSA-65 verification binary, the trust anchor with the issuer's public key, and a step-by-step guide. No account, API access, or trust in our servers is required. The cryptographic proof is self-contained.

Independent Audit

An independent operational audit (2026-03-28) confirmed the full protocol stack: runtime replay correctness, byte-level transport verification, mutation rejection, cross-backend interoperability, fuzz rejection, policy scenario enforcement, and performance envelope compliance across all supported parameter sets.

Workflows Using This Tool

2 / 3
Workflow
Saves ~15 min
File Management
Quantum-Safe File Attestation
Generate tamper-proof digital certificates for any uploaded file using post-quantum cryptography. This workflow guides the user through uploading or selecting a file via the File Management tool, then signs it with the Quantum-Safe File Attestation tool using ML-DSA-65 (Dilithium3) post-quantum digital signatures via hardware security module. Returns a verifiable attestation package containing a cryptographic manifest, digital signature, and verification bundle with a downloadable certificate link. Use cases include regulatory compliance document certification, financial audit report signing, legal contract attestation, intellectual property timestamping, medical record integrity verification, insurance claim evidence certification, notarized document equivalents, SOC 2 and ISO 27001 audit evidence, HIPAA-compliant document signing, tax filing certification, and tamper-proof archival of sensitive business documents.

Looking for help integrating AI into your business? Set up a free consultation.