NewPost-quantum hybrid signatures now available

Cryptographic Identity
for AI Agents

One identity. One instance. Complete audit trail.
Give your AI agents verifiable cryptographic identity with exclusive leasing and tamper-proof state chains.

$pip install sigaid
main.py
from sigaid import AgentClient

# Create agent with cryptographic identity
agent = AgentClient.create()

# Acquire exclusive lease - only one instance can run
async with agent.lease() as lease:
    # Record tamper-proof action to state chain
    await agent.record_action("booked_flight", {
        "flight": "UA123",
        "amount": 450.00
    })

    # Generate proof for third-party verification
    proof = agent.create_proof(challenge=service_challenge)

    # Service can verify: identity, lease, and history
    await service.verify(proof)  # ✓ Verified

The Agent Identity Problem

As AI agents gain autonomy, services need to verify three critical questions before trusting them.

Who is this agent?

How do you verify an AI agent's identity? Anyone can claim to be 'ShoppingBot-v2'. There's no cryptographic proof of who the agent actually is.

How many instances?

Is this the only running instance? Or are there 50 clones making conflicting decisions? You can't tell, and neither can the services they interact with.

What has it done?

When something goes wrong, there's no tamper-proof record of what the agent actually did. Logs can be altered. Memory can be wiped. Trust is impossible.

The Solution

Three Pillars of Agent Trust

SigAid provides cryptographic guarantees for identity, exclusivity, and auditability - everything services need to trust your agents.

Identity

Ed25519 Cryptographic Keys

Each agent gets a unique keypair. The public key becomes the AgentID - a verifiable, unforgeable identity.

agent_id = aid_7Xq9YkPzN3mWvR5tH8jL2c...
Exclusivity

Exclusive Leasing

Only one instance can hold an active lease at a time. Clones are cryptographically prevented from operating.

async with agent.lease(): # Atomic lock
Auditability

Tamper-Proof State Chain

Every action is cryptographically signed and hash-chained. Fork detection catches any tampering attempts.

entry_hash = BLAKE3(prev_hash || action)

See It in Action

Clean, intuitive API designed for developers. Get started in minutes.

Quick Start

Get your agent running with verifiable identity in 5 lines

from sigaid import AgentClient

# Create agent with cryptographic identity
agent = AgentClient.create()
print(f"Agent ID: {agent.agent_id}")
# Output: Agent ID: aid_7Xq9YkPzN3mWvR5tH8jL2cBfA4dE6gS1

# Acquire exclusive lease
async with agent.lease() as lease:
    print(f"Lease acquired until {lease.expires_at}")

    # Your agent logic here
    await do_agent_work()

Built for Real-World Agents

From financial transactions to autonomous systems, SigAid provides the trust layer your agents need.

Financial Agents

Payment processing, trading bots, expense management. Every transaction is cryptographically signed with a complete audit trail.

SOC 2 compliant audit logs

Booking & Reservations

Travel agents, appointment schedulers, resource allocators. Prevent double-bookings with exclusive leasing guarantees.

Zero double-booking risk

Security Operations

Incident response, access management, compliance automation. Tamper-proof records for security-critical operations.

Immutable security logs

Multi-Agent Systems

Orchestration platforms, swarm intelligence, collaborative agents. Verify which agent did what in complex workflows.

Complete agent attribution

Healthcare & Legal

Medical record access, legal document processing, regulated workflows. Meet compliance requirements with cryptographic proof.

HIPAA/regulatory ready

Autonomous Operations

Self-driving systems, robotics, IoT automation. Verify the single authorized instance is in control.

Guaranteed single control
Security First

State-of-the-Art Cryptography

SigAid uses the same cryptographic primitives trusted by security professionals worldwide. No compromises, no shortcuts.

Open Source

Full transparency. Review every line of cryptographic code.

No Custom Crypto

Uses established libraries: cryptography, blake3, pyseto.

Constant-Time Operations

Resistant to timing attacks on signature verification.

🔐

Ed25519 Signatures

256-bit security with 64-byte signatures. Fast, compact, and battle-tested.

🔗

BLAKE3 Hashing

State-of-the-art hash function. Faster than SHA-256 with 256-bit security.

🎫

PASETO Tokens

Modern JWT alternative. No algorithm confusion attacks possible.

🏷️

Domain Separation

Signatures are tagged by purpose. Cross-protocol attacks prevented.

🔒

HSM Support

PKCS#11 integration for hardware security modules. Keys never leave the HSM.

⚛️

Post-Quantum Ready

Hybrid Ed25519 + Dilithium-3 signatures for quantum resistance.

Simple, Transparent Pricing

Start free, scale as you grow. No hidden fees, no surprises.

Free

$0forever

Perfect for learning and small projects

  • 5 agents
  • 1,000 state entries/month
  • 1,000 verifications/month
  • Community support
  • Standard SLA
Most Popular

Pro

$49/month

For professional developers and startups

  • Unlimited agents
  • 100,000 state entries/month
  • 100,000 verifications/month
  • Priority support
  • 99.9% SLA
  • Custom domains
  • Webhooks

Enterprise

Custom

For organizations with advanced needs

  • Unlimited everything
  • Dedicated infrastructure
  • HSM key management
  • On-premise deployment
  • Custom SLA
  • 24/7 support
  • SOC 2 Type II