Litepaper
Nihilium Logo

Nihilium

A censorship resistance primitive for universal, uncensorable key recovery

The Web3 equivalent of "forgot my password" — making self-sovereign, UX-friendly key recovery possible for the first time

The Problem

Private key recovery is one of the biggest hurdles to mass adoption of self-custody and privacy-preserving applications. Existing approaches suffer from three fatal flaws:

Context-Locked

Recovery is tied to a single wallet, blockchain, or service. Your Ethereum wallet recovery doesn't help you access an encrypted backup.

Orchestration Burden

Solutions like social recovery require users to coordinate backups or validators manually. This is where UX problems originate.

Censorship-Prone

Custodial recovery, KYC checks, or service denial introduce points where access can be denied under regulatory pressure.

The Solution: Sealed Packages

At the core of Nihilium is the sealed package: a public key that encrypts a secret, paired with a private key that no party has ever seen.

Recovering the secret — unsealing — is only possible when the requesting party proves that specific conditions are met. Processors are cryptographically committed to these conditions and bound to execute when valid proofs are provided.

Context-Agnostic

The same primitive works for wallets, files, credentials, or identity proofs across any blockchain or application.

User-Friendly

No coordination required. The burden of proof lies with the recovering party, not with custodians or intermediaries.

Censorship-Resistant

Game-theoretic incentives ensure processors cannot selectively refuse requests without provable slashing.

Observable

Every recovery attempt is timestamped and observable on-chain, ensuring full transparency and auditability.

Applications

Web3 "Forgot My Password"

Universal key recovery for passwords, seed phrases, or private keys using ZKEmail, ZKPassport, or other verifiable proofs.

Secure File Transfers

Cryptographic proof of file access without central authorities. Live demo at transfer.nihilium.io

Emergency Medical Data

Privacy-preserving access to critical medical data during emergencies with full auditability of access attempts.

Compliance & Oversight

"Break-glass" procedures requiring multiple verifiable proofs. Keeping honest people honest through transparent access logging.

How It Works

Three-Layer Architecture

Nihilium operates through Clients (who generate proofs), Processors (who validate and execute), and the Enforcement Layer (blockchain arbiter of last resort).

In normal operation, the protocol runs entirely off-chain and scales indefinitely. On-chain execution is only required when something goes wrong.

It utilizes a combination of zero-knowledge proofs, homomorphic encryption and financial incentives to ensure that the protocol is sensorship resistant, scalable, and secure.

Modular Conditions

The protocol enables high modularity for proof aggregation, allowing complex combinations of conditions to be created.

Unseal conditions could include ZKEmail, ZKPassport, ownership proofs, time-locks etc, and any combination of these.

Economic Security

Sealing is prepaid. Unsealing is free. Processors are economically bound to execute without extortion risk.

Get In Touch

Stay Updated

Connect With Us

Follow Our Progress

@nihiliumio

Try Our Demo

transfer.nihilium.io

Live demonstration of sealed file transfers

Learn More

Read the Litepaper

Deep dive into the technical architecture and applications