What is MPC
Secure MPC is the most advanced, secure, and convenient multi-party consensus computing technology.
Bank-Level Security
Optimized for Businesses
Supports Multiple Environments
wHTA is MPC

Multi-Party Consensual Data Exchange

MPC technology allows the derivation of specific values determined by the members during an exchange, without exposing other secretive values.
Calculation proceeds only when the specified threshold is met, after which a transparent and fair consensus process would be performed.
The calculation process is randomly updated every time, so that the agreement won’t be revealed even if the value gets exposed.

KEY CREATION
KEY SIGNING
Less Burden
Higher Security
The responsibility for keeping the key safe and sound, and the authority over the keys is equally divided amongst the MPC Group members. Therefore, with MPC, SPOF (Single Point of Failure) can be removed while SoD (Segregation of Duties) can be set on any system easily.
In the process of creating a signature, a whole key is never generated or exposed because the MPC technology uses Partial MPC Key mechanism. Hence, without a full set of keys ever being formed or exposed, it dramatically diminishes the chance of fraudulent accidents, hacking, or losing the key.
Less Burden, Higher Security

MPC enhances security while reducing the burden of key management, which waspreviously the user’s responsibility. Users can reachanagreementanytime using the remaining keys,even if they lose the key or if the custody service provider ceases operation.

HOW TO USE MPC
MPC Group Creation

1.  Distributed Users
Minimum of two or more users from various locations take part in the MPC Group as ‘members’

2.  Generating Split Public Key
Users in distributed spaces keep and manage their own ‘secret value’. This ‘secret value’ is gathered to generate a Split Public Key which allows the formation of a signature.

3.  Full Key Is Never Exposed
In the process of creating an MPC Group or generating a signature, a complete key is never generated nor exposed.

MPC Group Signing

1. Trust
All selected members of the MPC Group are those who have been verified when creating the MPC group

2.  Consensus
All members are given different secret keys when setting the quorum. Anyone can either take part in the agreement to approve the request for a signature or watch the formation of signature take place

3.  Sign!
When the quorum is met, the signature proceeds. One whole key is neither generated nor used externally in any part of the signing process

MPC Group Signing

1. Trust!
All members participating in the signature in the MPC Group are those who have been verified when creating the MPC group.

2.  Consensus!
They use their secret key to satisfy the initial set quorum, and anyone can view the progress of the agreement.

3.  Sign!
If the quorum is satisfied, the signature proceeds. In the process of signing, the private key of the individual is not revealed.

USE CASE
Digital Assets
Custody Service
From traditional banking institutions to digital asset experts, great level of risks, costs, and responsibilities are put on their shoulders to manage/store large-scale of digital assets. Therefore, it is crucial for any individual or institution to find highly experienced custody service providers that are renown for its expertise in making sure that all assets guaranteed to be kept safe and secure. Custody services with great awareness for security will operate on MPC-based consensus and safely create transactions by forming MPC groups with members that are qualified.
Digital Assets
Escrow
Escrow is a financial agreement of two parties which sets a reliable third party to handle transactions of the funds, assets and properties. For an escrow service, not only is it important to create a group that consists of trustworthy members, but also for transactions take place even when a number of keys have been stolen or cannot be operated.
Legacy
Supply Chain Management
According to an OECD report, 2.5% of food, beverage, medical imported goods are counterfeit products. Manufacturers are struggling with this issue, as backtracking every layer of the supply chain system consumes too much time, money and other resources. Average of 200 approvals are required for a product to be distributed to 30 retailers and tracing back all these records to find where counterfeit products came from takes more than 7 days. In other words, fighting off the counterfeit industry inevitably means many lags and delays for the entire supply chain system and very expensive management costs. Good news is, if we incorporate MPC technology into the supply chain management system, it is possible to eliminate all the layers of many complicated steps. To specify, all parties that are designated to approve a very specific process can be put into an MPC Group, and approval of every supply chain layer can be operated based on a M-of-N consensus. This way, not only is it a lot quicker and easier to deliver the products from start to finish, but would take merely 10 seconds to back track the entire supply chain and see where the counterfeit products derive from.
Legacy
Document Management System
Search, OCR, Workflow, Version Control, Document Retrieval, Document Archiving and etc., the list goes on when it comes to naming numerous types of document managing tasks, and only limited human resources are allocated to do fulfill it. Moreover, not all employees have full authority to access every document, therefore requiring an extra step to get the necessary approval in getting work done. MPC can minimize the overall time that it takes to ‘request access’-’read request’-’escalate to authority’-’approve’-’access’ by forming a group of administrators that can simultaneously approve a request. With the threshold approval scheme ‘M-of-N’, no one member holds full authority to create a signature, thus preventing any accidents from key theft or cyber attacks.
Articles

Secure Multi-Party Computation

GET SDK
We are offering MPC software development kits to you.
Try it now for free!
GET Started