Skip to content

All About MPC Wallets

  • by

The security of cryptocurrency is a matter which is very serious One instance to illustrate this would be the creation of the popular MPC purses, or wallets. They are the result of a combination of various technologies that are designed to provide the best security possible, commercial and military-grade security and protection of cryptocurrency in a manner that it is almost impossible to steal them without the permissions needed to do so.

But what exactly is an MPC wallet? What makes them secure? All of these questions and more will be answered in this post that will help you get to know the latest cryptocurrency wallets.

What exactly is Multiparty Computing? MPC?

Before you can decide on an MPC wallet or purse It is important to know what Multi-Party Computing, also known as MPC, is. MPC also known as Multiparty Computing is a term used to describe cryptographic security. It was created to allow security models that allow for the use of various components are needed to gain access to the system’s resources. Each party has keys that when connected to the others, allows for access to system resources to be locked and managed. The control may be total or limited, based on the degree that access is granted.

The development of these protocols dates back to the year 1970 They have advanced until nowadays, a lot of these protocols are embedded into computer chips in order to ensure the security of computer systems.

Because of its many possibilities due to its enormous potential, cryptocurrency enthusiasts have been very interested in this type of technology. In reality, David Chaum In 1988 was the first to present an extremely well-known paper under the title of “Unconditionally Secure Multi-Party Protocols”. However, Nick Szabo, in 1999 also released the well-known book “God’s protocols” in addition to describing the advantages of MPCs within the field of computing and their application in the world of economics as well as financial system. This gives us an understanding of the significance of these protocols and their introduction into the realm of cryptocurrency.

MPC wallets and security made to the max

The MPC wallets, also known as multi-party computing wallets the full form of these wallets, is the latest generation of wallets designed for cryptocurrency and tokens that aim to provide the best security standards to both those who are who are concerned about security as well as for corporations as well as governments and banks that are looking to make cryptocurrencies an asset that is suitable to be used in their business.

In essence it is the MPC wallet is just like other wallets, with the exception its private keys as well as the control are split between multiple devices. Each device is controlled by the key that, once connected to the other allows for the use of funds in the wallet. On first look, it is apparent we’re talking about a wallet or a multi-signature purse. However, to a certain extent, the structure that is used in these MPC wallets is similar.

The only difference is that MPC wallets also have other enhancements that are noteworthy, for instance the fact that control devices can create dynamic keys in one use , and also with the expiration date, which , when added to the other, allow the usage of money. Additionally, MPC wallets can use methods like the popular ECDSA, EdDSA, other contemporary signature formats like threshold signatures, Schnorr companies, or different security methods.

Imagine for a moment the possibility of a wallet that is linked to multiple single-use generators, that together grant the user access to their cryptocurrency. The fact that generators are asynchronous and single-use ensures that the key will never repeat itself or re-used. If the sequence is not completed then you won’t be able to access your funds. This means that even though you may access devices and copy your wallet’s keys, once the keys are no longer valid or were used, the money cannot be accessed. This security level allows the creation of barriers that hackers could not break, and avoid difficult incidents like hacking Mt Gox, or the loss of access from QuadrigaCX.

Another benefit of MPC wallets is the fact that the control mechanism can be applied to a variety of cryptocurrency at the same time which greatly simplifies the management of security for the tokens.

Integration of hardware and software

Another benefit of MPC accounts is that they offer more integration between hardware and the applications which comprise them. For instance an MPC wallet is an isolated device that could be synchronized with signature devices. This sync happens via a cryptographic software powered by modules. These are HSMs (Hardware Security Modules) could render these funds unobtainable via an online attack and vulnerable to hacks of a sort. If the devices that synchronize are not functioning as they should the synchronization does not happen, or access to devices is denied.

Naturally, this can be flexible. For instance, in the event of an emergency the wallet can be configured to execute the “recovery transaction” which will transfer the funds to a safe custodian in order to retrieve balances. This will ensure that from happening, for instance, following the loss or theft of devices or keys, the money is kept for the duration of MPC’s MPC wallet, allowing for their retrieval without any issues.

The integrations, as well as new features allow MPC wallets safer than traditional wallets or multi-signature wallets. However, it makes the wallets more expensive and difficult to use in daily use environments and, therefore, this kind of technology is intended for exchanges, companies or those who manage massive amounts of cryptocurrency and need the most secure security possible for them.

What is the process behind an MPC wallet function?

The functioning that an MPC wallet is largely dependent on the way it is implemented and the security systems that are in place. In a fundamental way, the functioning that happens with an MPC wallet is separated into three distinct parts:

Key generation

Key generation encompasses the whole procedure of creating public and private keys inside the wallet. Also, it is the registry of both public and private keys of the devices for freedom of purse.

In this manner the devices that unlock create a pair of public and private keys. They are then linked to other devices to create using them the public and private keys for the MPC wallet. Like a multi-signature wallet, this method aims to separate the control over the wallet in order to stop a malicious or hacker person from being able to gain access to the wallet easily.

In addition the process of creating these keys is governed by a specific protocolthat is defined by the mathematical formula:

F (d1, D2, 3) = maximum (d1 2, d2)

This means that, every participant has private data (recognized as d1, D2 and all the way to dN). The existence of these private details permits the usage of a public function known as F. This function is where the value of private data is calculated , and the usage of the wallet made possible. The algorithm used in this instance is the cryptographic signature algorithm. It could comprise ECDSA, EdDSA, Schnorr or any other one compatible. In the end, the total of the private information gives a cryptographic security for an access point to the account.

Generation of addresses

At the moment at this point, at this point, MPC wallets aren’t different from the wallets we have already seen. The creation of public keys is a possibility for any of the signers without difficulty. This way the requested funds will be received at that address.

This is made possible by the way asymmetric cryptography works. The method of deriving the key public is complex that attempting to reverse it is virtually impossible. It is therefore secure to create a public key for every participant. In addition, from it the other keys that are public can be generated that permit the transfer in funds for the MPC wallet. In this way the purpose is the purpose of an MPC wallet is to keep control of the private key, which is divided between multiple devices. Therefore, the management of balances isn’t at risk.

Access to money

As with the generation process access to funds is granted only if the requirements set in the process of creating the MPC wallet are fulfilled. If, during the generation process three devices that had private information were added the three devices have to be connected to the wallet.

At present it is possible that the security of devices is likely to be based on security devices, cryptographic systems (HSM) and other safety options. In reality, only the original devices are the only ones that can access MPC’s MPC wallet and directing the funds.