Zero-Knowledge Architecture
Our platform is built on a zero-knowledge principle:Client-Side Encryption
All data is encrypted on your device before transmission
No Plaintext Access
Servers only see encrypted data, never your actual data
You Control the Keys
Encryption keys are generated and stored only on your side
Post-Quantum Security
Protected against both current and future quantum computing threats
How It Works
The encryption architecture uses a two-server model for defense in depth:PCCI Proxy vs PCCI Enclave
| Component | What It Sees | Purpose |
|---|---|---|
| PCCI Proxy | Only encrypted data | Stores and routes encrypted data, never sees plaintext |
| PCCI Enclave | Decrypted data | Decrypts, processes requests, encrypts responses in isolated environment |
The PCCI Proxy acts as a secure gateway that never has access to your plaintext data. It simply forwards encrypted payloads to the PCCI Enclave. Even if the proxy were compromised, attackers would only see encrypted data.
- Decryption happens in a secure environment
- Processing occurs completed isolated
- Responses are encrypted before leaving
- Even server operators cannot access the plaintext, no operator access mechanism exists in the images
Key Types
- KEK (Key Encryption Key) — Your master key (32 bytes) that protects all other keys. Never leaves your device unencrypted.
- DEK (Data Encryption Key) — Unique key for each file (32 bytes). Each file gets its own key for isolation.
- RAG DEK — Persistent Key (32 bytes) used for encrypted document search operations.
- CONNECTOR DEK - Persistent Key (32 bytes) used for decrypting connectors in the enclave.
- KID (Key Identifier) — Derived from your KEK to identify your keys on the server without revealing the KEK itself.
Your master key (KEK) never leaves your device unencrypted. File keys (DEKs) are wrapped with your KEK before transmission, and the RAG DEK is also wrapped with your KEK when stored on the server. For RAG operations, both the file DEKs and RAG DEK are encrypted with a temporary shared secret from XWing key exchange before being sent to the enclave.
Cryptographic Algorithms
PCCI uses modern, battle-tested cryptographic algorithms:| Algorithm | Type | Purpose |
|---|---|---|
| XChaCha20-Poly1305 | AEAD | Encrypts all your data with authentication |
| AES-KWP | Key Wrap | Securely wraps file keys with your master key |
| XWing | Hybrid KEM | Post-quantum secure key exchange |
Post-Quantum Security with XWing
XWing is a hybrid key encapsulation mechanism that combines two algorithms for maximum security:- ML-KEM768 (Kyber) — NIST-standardized quantum-resistant algorithm
- X25519 — Battle-tested elliptic curve algorithm
File Encryption
Every file you upload goes through a secure encryption process:Encryption Process
1
Generate File Key
A unique random 32-byte key is created for this specific file
2
Encrypt Content & Metadata
File content and metadata (filename, type) are encrypted with XChaCha20-Poly1305
3
Wrap File Key
The file key is encrypted with your master key using AES-KWP
4
Upload
Only encrypted data and wrapped keys are sent to the server
Decryption Process
When you retrieve a file:- Download encrypted file and wrapped key from server
- Unwrap the file key using your master key
- Decrypt the file content and metadata
RAG Encryption
For encrypted document search, PCCI uses a secure key exchange scheme that enables AI-powered search while maintaining privacy:How RAG Search Works
1
Key Exchange
When you index files for search:
- XWing key exchange establishes a shared secret with the enclave
- File key (DEK) is encrypted with the shared secret
- RAG key is encrypted with the shared secret
- Both encrypted keys are sent to the enclave
2
Search Query
When you search:
- Your query is encrypted on your device
- A new XWing key exchange is established
- Encrypted query is sent to the enclave
3
Secure Processing
Inside the secure enclave:
- Shared secret decrypts the RAG key and file keys
- Relevant documents are decrypted using their file keys
- Documents are searched in isolation
- Results are encrypted before leaving
4
Results
Encrypted results are sent back to your device and decrypted locally
The PCCI Proxy never sees your search queries or document contents. All processing happens in the isolated PCCI Enclave.
Secure Key Exchange
For chat completions and tool operations, secure communication is established using XWing key exchange:Best Practices
Secure Your Master Key
Your master key (KEK) is critical. Store it securely with proper backups.
Regular Backups
Backup your keys to multiple secure locations. A lost master key means permanent data loss.
Never Share Keys
Your encryption keys should never be shared or transmitted in plaintext.
Verify Integrity
The system automatically verifies data integrity. Pay attention to any authentication errors.

