Self-Sovereign Wallet Infrastructure

Digital Asset Custody
Without Compromise

Enterprise-grade multi-party computation with 8 cryptographic protocols, configurable t-of-n thresholds, multi-chain support, and post-quantum security. Your keys never exist in a single location.

8
Protocols
t-of-n
Configurable
<5ms
Signing (3-of-n)
4
Curves
17
ZK Proofs
PQ
Quantum-Safe

Cryptographic Protocols

Production-grade implementations spanning classical threshold cryptography, post-quantum lattice schemes, and fully homomorphic encryption.

CGGMP21

Threshold ECDSA

4-round signing with identifiable aborts over secp256k1. Presignatures for offline signing. Bitcoin, Ethereum, all EVM chains.

FROST

Threshold Schnorr / EdDSA

2-round signing with hedged deterministic nonces. Ed25519 for Solana and TON. BIP-340 Taproot for Bitcoin. BIP-32 chaining keys.

LSSS

Linear Secret Sharing

Dynamic resharing without key reconstruction. Transition t-of-n to t'-of-(n±k) with zero downtime. Generation history with rollback. Byzantine fault tolerant.

TFHE

Threshold Homomorphic Encryption

Multi-party threshold decryption with homomorphic operations. Partial share aggregation via Lagrange coefficients. Confidential compute on encrypted data.

Ringtail

Post-Quantum Lattice

Module-LWE threshold signatures at 128/192/256-bit security levels. Proactive share refresh. Protection against quantum adversaries.

Quasar

Hybrid BLS + Post-Quantum

Quantum-Safe And Reliable. Combines BLS12-381 pairing-based signatures with Ringtail lattice for immediate and future-proof security.

BLS

Aggregate Signatures

BLS12-381 pairing-based threshold signatures with efficient aggregation. Compatible with Ethereum 2.0 and other consensus systems.

Doerner

Optimized 2-of-2 ECDSA

Constant-time 2-party ECDSA at ~5ms signing. Specialized for peer-to-peer custody and co-signing workflows.

Platform Capabilities

Everything you need for institutional-grade digital asset custody and wallet operations.

Configurable Threshold

Any t-of-n scheme: 2-of-3, 3-of-5, 5-of-9, 10-of-15, or any custom configuration. Byzantine-resilient majority with t ≥ ⌊n/2⌋ + 1.

Dynamic Resharing

Add or remove signing parties without changing public keys or addresses. LSSS-based protocol transitions t-of-n to t'-of-(n±k) with generation rollback on failure.

Post-Quantum Security

Ringtail lattice-based signatures and Quasar hybrid scheme provide protection against future quantum computer attacks at configurable security levels.

Confidential Compute

TFHE threshold homomorphic encryption enables computation on encrypted data. Multi-party decryption with partial share aggregation. Private policy evaluation.

Zero-Knowledge Proofs

17 ZK proof systems including Paillier multiplication, Pedersen-Rabin, Schnorr proofs, range proofs, and polynomial commitments for verifiable computation.

Unified IAM

All operations authenticated via Hanzo ID. Bearer token validation, role-based access control, and audit logging for compliance.

Multi-Chain Support

Native support for every major blockchain ecosystem through protocol-specific curve implementations.

Bitcoinsecp256k1
Bitcoin TaprootBIP-340
Ethereumsecp256k1
All EVM Chainssecp256k1
SolanaEd25519
TONEd25519
CardanoEd25519
NEAREd25519
PolkadotEd25519
Cosmossecp256k1
Lux Networksecp256k1
XRPLsecp256k1
BNB Chainsecp256k1
Polygonsecp256k1
Arbitrumsecp256k1
Ethereum 2.0BLS12-381

Performance

Real benchmarks on Apple M-series silicon. Signing is O(t) — independent of total party count. Keygen is O(n²) communication.

FROST Protocol — Full Execution (secp256k1)

Operation3 parties10 parties20 parties30 parties50 parties
Key Generation22ms38ms332ms535ms1.9s
Signing (t signers)<5ms8ms18ms35ms55ms
Verification2ms2ms2ms2ms2ms

Cryptographic Primitives at Scale

Operation101001,00010,000
Scalar Multiplication6.6ms2.3ms23ms232ms
Point Addition<0.01ms0.1ms1.1ms11ms
Lagrange Coefficients0.1ms10ms1.3s115s
Polynomial Evaluation<0.01ms1.6ms166ms16.7s
Blake3 Hashing<0.01ms0.03ms0.4ms3.4ms

Signing uses only t threshold signers regardless of total n. A 10-of-10,000 scheme signs as fast as 10-of-10. Keygen/reshare touch all n parties — use tiered architecture at >100 nodes.

Security Properties

No Single Point of Failure

Private keys are never reconstructed. Threshold parties hold shares that are individually useless. Compromise of t-1 parties reveals nothing.

Identifiable Aborts

CGGMP21 identifies the exact cheating party in a failed signing session. Automated fault recovery with node eviction via LSSS.

Proactive Security

LSSS share refresh and Ringtail proactive rotation ensure long-term security even if shares are periodically exposed. Generation-based key lifecycle.

Encrypted Storage

All key shares encrypted at rest with AES-256 via BadgerDB. Optional KMS integration for hardware-backed encryption keys.

Ready to secure your digital assets?

Get started with Hanzo MPC in minutes. Self-hosted or managed.

Sign In with Hanzo ID Contact Sales Read the Docs