Cryptographic Identity
for AI Agents
One identity. One instance. Complete audit trail.
Give your AI agents verifiable cryptographic identity with exclusive leasing and tamper-proof state chains.
pip install sigaidfrom sigaid import AgentClient
# Create agent with cryptographic identity
agent = AgentClient.create()
# Acquire exclusive lease - only one instance can run
async with agent.lease() as lease:
# Record tamper-proof action to state chain
await agent.record_action("booked_flight", {
"flight": "UA123",
"amount": 450.00
})
# Generate proof for third-party verification
proof = agent.create_proof(challenge=service_challenge)
# Service can verify: identity, lease, and history
await service.verify(proof) # ✓ VerifiedThe Agent Identity Problem
As AI agents gain autonomy, services need to verify three critical questions before trusting them.
Who is this agent?
How do you verify an AI agent's identity? Anyone can claim to be 'ShoppingBot-v2'. There's no cryptographic proof of who the agent actually is.
How many instances?
Is this the only running instance? Or are there 50 clones making conflicting decisions? You can't tell, and neither can the services they interact with.
What has it done?
When something goes wrong, there's no tamper-proof record of what the agent actually did. Logs can be altered. Memory can be wiped. Trust is impossible.
Three Pillars of Agent Trust
SigAid provides cryptographic guarantees for identity, exclusivity, and auditability - everything services need to trust your agents.
Ed25519 Cryptographic Keys
Each agent gets a unique keypair. The public key becomes the AgentID - a verifiable, unforgeable identity.
agent_id = aid_7Xq9YkPzN3mWvR5tH8jL2c...Exclusive Leasing
Only one instance can hold an active lease at a time. Clones are cryptographically prevented from operating.
async with agent.lease(): # Atomic lockTamper-Proof State Chain
Every action is cryptographically signed and hash-chained. Fork detection catches any tampering attempts.
entry_hash = BLAKE3(prev_hash || action)See It in Action
Clean, intuitive API designed for developers. Get started in minutes.
Quick Start
Get your agent running with verifiable identity in 5 lines
from sigaid import AgentClient
# Create agent with cryptographic identity
agent = AgentClient.create()
print(f"Agent ID: {agent.agent_id}")
# Output: Agent ID: aid_7Xq9YkPzN3mWvR5tH8jL2cBfA4dE6gS1
# Acquire exclusive lease
async with agent.lease() as lease:
print(f"Lease acquired until {lease.expires_at}")
# Your agent logic here
await do_agent_work()Built for Real-World Agents
From financial transactions to autonomous systems, SigAid provides the trust layer your agents need.
Financial Agents
Payment processing, trading bots, expense management. Every transaction is cryptographically signed with a complete audit trail.
Booking & Reservations
Travel agents, appointment schedulers, resource allocators. Prevent double-bookings with exclusive leasing guarantees.
Security Operations
Incident response, access management, compliance automation. Tamper-proof records for security-critical operations.
Multi-Agent Systems
Orchestration platforms, swarm intelligence, collaborative agents. Verify which agent did what in complex workflows.
Healthcare & Legal
Medical record access, legal document processing, regulated workflows. Meet compliance requirements with cryptographic proof.
Autonomous Operations
Self-driving systems, robotics, IoT automation. Verify the single authorized instance is in control.
State-of-the-Art Cryptography
SigAid uses the same cryptographic primitives trusted by security professionals worldwide. No compromises, no shortcuts.
Open Source
Full transparency. Review every line of cryptographic code.
No Custom Crypto
Uses established libraries: cryptography, blake3, pyseto.
Constant-Time Operations
Resistant to timing attacks on signature verification.
Ed25519 Signatures
256-bit security with 64-byte signatures. Fast, compact, and battle-tested.
BLAKE3 Hashing
State-of-the-art hash function. Faster than SHA-256 with 256-bit security.
PASETO Tokens
Modern JWT alternative. No algorithm confusion attacks possible.
Domain Separation
Signatures are tagged by purpose. Cross-protocol attacks prevented.
HSM Support
PKCS#11 integration for hardware security modules. Keys never leave the HSM.
Post-Quantum Ready
Hybrid Ed25519 + Dilithium-3 signatures for quantum resistance.
Simple, Transparent Pricing
Start free, scale as you grow. No hidden fees, no surprises.
Free
Perfect for learning and small projects
- 5 agents
- 1,000 state entries/month
- 1,000 verifications/month
- Community support
- Standard SLA
Pro
For professional developers and startups
- Unlimited agents
- 100,000 state entries/month
- 100,000 verifications/month
- Priority support
- 99.9% SLA
- Custom domains
- Webhooks
Enterprise
For organizations with advanced needs
- Unlimited everything
- Dedicated infrastructure
- HSM key management
- On-premise deployment
- Custom SLA
- 24/7 support
- SOC 2 Type II