MPC technology allows the derivation of specific values determined by the members during an exchange, without exposing other secretive values.
Calculation proceeds only when the specified threshold is met, after which a transparent and fair consensus process would be performed.
The calculation process is randomly updated every time, so that the agreement won’t be revealed even if the value gets exposed.
MPC enhances security while reducing the burden of key management, which waspreviously the user’s responsibility. Users can reachanagreementanytime using the remaining keys,even if they lose the key or if the custody service provider ceases operation.
1. Distributed Users
Minimum of two or more users from various locations take part in the MPC Group as ‘members’
2. Generating Split Public Key
Users in distributed spaces keep and manage their own ‘secret value’. This ‘secret value’ is gathered to generate a Split Public Key which allows the formation of a signature.
3. Full Key Is Never Exposed
In the process of creating an MPC Group or generating a signature, a complete key is never generated nor exposed.
All selected members of the MPC Group are those who have been verified when creating the MPC group
All members are given different secret keys when setting the quorum. Anyone can either take part in the agreement to approve the request for a signature or watch the formation of signature take place
When the quorum is met, the signature proceeds. One whole key is neither generated nor used externally in any part of the signing process
All members participating in the signature in the MPC Group are those who have been verified when creating the MPC group.
They use their secret key to satisfy the initial set quorum, and anyone can view the progress of the agreement.
If the quorum is satisfied, the signature proceeds. In the process of signing, the private key of the individual is not revealed.