Legal Signatures. Zero-Knowledge Proofs.
Cryptographically bind identity to every business action. Court-admissible evidence by default. eIDAS-compliant without centralised certificate authorities. Deployed with European tax authorities.

Trusted by enterprises and governments across Europe


mintBlue turned our nightmare of invoice exchanges into a dream of automation. Now we strive to make taxation less of a headache for everyone involved.
Claire Arens
Innovation & Strategy, Netherlands Tax Administration
6 million invoices annually validated and processed automatically. No manual reconciliation. No disputes over what was agreed.
Sebastian Toet
Solutions Architect, VISMA | Yuki
Real-time, verifiable carbon tracking across our entire supply chain without exposing sensitive supplier data.
Pauline Van Ostaeyen
Cofounder, Dockflow
The Identity-Action Gap
Your systems record what happened. Your logs show when it happened. But can you prove in court who authorized it? Can you prove they had legal authority at that exact moment? And can you do this without exposing sensitive transaction details to auditors?
Self-Sovereign Identity closes the gap with mathematical proof.
Traditional Identity
- Username/password proves login, not authorization
- Central certificate authorities (single point of failure)
- Compliance audits require revealing transaction details
- No link between company identity and signatures
Self-Sovereign Identity
- Every action cryptographically signed
- No central authority required
- Zero-knowledge compliance proofs
- LEI-integrated company verification
Cryptographic Identity Bound to Every Action
Your keys, your control, your sovereignty.
01
Cryptographic Non-Repudiation
Signer cannot later claim they did not authorize an action. Private key proves identity. LEI integration proves company authority. eIDAS-qualified signatures legally enforceable across EU.
02
LEI-Integrated Company Verification
Legal Entity Identifier cryptographically bound to signing keys via Glyffe integration. Proves company is legally registered, key belongs to that company, and signer has authority. No manual verification required.
03
Zero-Knowledge Compliance Proofs
Prove compliance without revealing transaction details. Total VAT correct without showing individual invoices. All suppliers EU-based without revealing names. GDPR data minimization by design.
04
Client-Side Key Control
Private keys encrypted with password-based key derivation (PBKDF2). Encryption happens in browser before transmission. mintBlue never accesses unencrypted keys. Self-sovereign means you own your identity.
Real-Time Tax Filing with ZK Proofs
See It in Action
Business submits VAT calculation to tax authority with mathematical proof and privacy preservation.

- 01

Keys Generated Client-Side
Company accountant creates cryptographic key pair. Password-based key derivation encrypts private key locally. mintBlue servers never see the unencrypted private key.
- 02

Company Verified via LEI
Legal Entity Identifier bound to company's public key via Glyffe. Tax authority can verify: company is legally registered AND authorized this action. No manual verification needed.
- 03

VAT Transaction Signed
Accountant signs VAT submission binding WHO (identity + company LEI), WHAT (VAT amount), and WHEN (timestamp). eIDAS-qualified signature carries same legal standing as handwritten.
- 04

ZK Proof Verified Instantly
Zero-knowledge proof confirms VAT calculation correct without revealing individual invoice amounts. Tax authority verifies cryptographically in under 100ms. Business confidentiality maintained.
From manual verification to mathematical proof
Zero
Manual verification needed
<100ms
Cryptographic verification
100%
Court-admissible evidence
Zero
Business data exposed
SSI vs Traditional Identity Systems
| Capability | Username/Password | OAuth/SAML | Traditional PKI | mintBlue SSI |
|---|---|---|---|---|
| Proves action authorization | No (audit logs alterable) | No (token proves session) | Only if signed (rare) | Every action signed |
| Legal non-repudiation | User can claim stolen | No legal standing | If qualified certificate | eIDAS-qualified |
| Company verification (LEI) | No company binding | No company binding | Manual certificate | Automated LEI integration |
| Privacy-preserving (ZK) | No privacy features | No privacy features | Signatures reveal all | Zero-knowledge proofs |
| User controls keys | Vendor servers | Provider controls | CA controls trust | Client-side encryption |
| Central authority needed | Requires auth server | Requires identity provider | Requires CA | Peer-to-peer verification |
SSI complements existing auth systems. Use OAuth for login, SSI for legal signatures on critical actions.
Legal & Technical Questions
Legal
Technical

Court-admissible operations
Ready for Court-Admissible Business Operations?
From compliance assessment to eIDAS-qualified implementation. Our legal and technical teams help you deploy cryptographic identity that holds up in court.
Court-admissible operations
Ready for Court-Admissible Business Operations?
From compliance assessment to eIDAS-qualified implementation. Our legal and technical teams help you deploy cryptographic identity that holds up in court.
