Posts in Multiparty Computation
Balancing Compliance With US CLOUD Act and GDPR

In 2016, I wrote this blog on Lack of Trust in Big Brother. Since then, the U.S. Government created the Clarifying Overseas Use of Data Act (CLOUD Act), which introduces direct conflicts with the EU’s General Data Protection Regulation (GDPR). While enterprise migration to the cloud has progressed quite extensively over the past five years, many companies continue to wrestle with how to maintain compliance with these potentially conflicting laws. Fortunately, improvements in key management to support Bring Your Own Key (BYOK) services can mitigate those conflicts for easy and compliant cloud migration.

Read More
Minimize Ethereum Gas & Fees With MPC

Ethereum transaction fees have hit new highs in 2021. One of the factors is that the price of Ethereum has also hit new highs, but there’s much more to it. One way to minimize transaction fees is to use secure Multiparty Computation (MPC) for your multiple party approved transactions. In addition to minimizing the cost of your own transactions, you’ll maximize Ethereum’s throughput and contribute to reducing fees for everyone.

Read More
Secure Multiparty Computation (MPC) for Agile Enterprise Key Management

Secure Multiparty Computation (MPC) is a technology that is gaining widespread interest for both data privacy and protection applications. This article focuses on the use of secure MPC to protect cryptographic keys used for practical enterprise key management applications.

Historically, key management is complex, inflexible, and expensive. Enterprises need key management solutions that …

Read More
Sepior Key Management Secures Innovative New Social Media Platform

Instars, the pioneering decentralized and privacy-focused social networking platform, has integrated Sepior’s multiparty computation (MPC) key management to secure digital assets for the Instar Blockchain. Instars.com is the first social networking platform to use a combination of blockchain technology and secure MPC to provide innovative new social networking and personal data exchange services.

Read More
Double Key Encryption of Office 365 - For When Trusting Microsoft Isn’t Good-Enough

Most of us have confidence in Microsoft’s ability to protect Office 365 content hosted in Azure. The consequences for Microsoft, and its customers, would be too high to tolerate anything less than industry-leading security. But what if Azure is compelled to provide access to sensitive content or to meet specific jurisdictional privacy regulations. This is where DuoKey’s recently announced key service, based on multiparty computation (MPC) is a game-changer.

Read More
Blockchain and MPC Use Case: COVID-19 Tracking

Nations globally are under immense pressure to contain and suppress the spread of COVID-19. One of the resources required is an effective tool for tracking infected individuals, identifying other parties they’ve been in proximity with, and contacting them. Naturally, this exercise brings up the difficult balance between privacy and public safety.

Read More
Department of Treasury Gives The Nod, But Are Banks Ready To Custody Cryptocurrencies?

The Office of the Comptroller of the Currency (OCC) issued a letter on July 22, 2020 clarifying US national banks' and federal savings associations' authority to provide cryptocurrency custody services for their customers. This is a major step forward in bringing cryptocurrency to a place where more mainstream adoption is likely. The big questions are what’s different about providing custody of cryptocurrencies, and how will these mainstream institutions provide these services?

Read More
Crypto Wallets 2.0, Improving Asset Security and Agility

In 2008, the same year that Satoshi Nakamoto published the famous Bitcoin white paper, a group of cryptography researchers in Denmark implemented the first production deployment of a technique known as Multiparty Computation (MPC). It was not obvious at that time, but MPC would ultimately become the basis for Crypto Wallets 2.0, ushering in an era of increased security for institutional- and consumer-grade wallets, with native support for any digital asset.

Read More
MPC Minimizes Vulnerability of Non-Hardened xPub Key Derivation

HD wallets are a feature of bitcoin and similar cryptocurrencies with the goal of providing improved privacy and usability. Compelling benefits can be achieved when using non-hardened key derivation. The problem is that if the private key corresponding to an xPub address is somehow leaked, then the private keys of *all* “siblings” and the parent can be exfiltrated. Multi-party computation offers a way to improve this state of affairs because a private key is never in one place (even when signing).

Read More
Proudly introducing the MPC Alliance

After several months of cultivating the idea, socializing with others, and working closely with other developers and practitioners of multiparty computation (MPC) solutions, Sepior is proud to co-found the MPC Alliance. Sepior initiated this effort because of our unwavering belief that MPC will profoundly improve the security, privacy, and innovation of online services.

If the above sounds interesting and compelling to you and your company, we invite you to contact us through the MPC Alliance website to learn more and to join our cause.

Read More
Yet another reminder, Account Security = Key Security

The announcement last week of Fusion Foundation’s $6.4M cryptocurrency theft was not major in terms of the magnitude of the loss on market scale, but it’s an important reminder that even the best secured wallets are no more secure than the security of the keys that protect them. The resulting loss of more than 80% in market cap value, (now improved to 40%) is also a reminder of the consequences to shareholders when such events happen.

Read More
Turn-Key Simplicity Meets MPC Security

The recent announcement of the CYBAVO VAULT™ is an important milestone in the industry’s migration toward more secure, multiparty computation (MPC) -based cryptocurrency wallets and expands the rapid adoption opportunities to a far wider range of users.

Some of the industry’s largest and most technologically advanced financial services firms are implementing MPC to maximize transaction security on their exchanges and custodial wallets. (See the blog An Introduction to Threshold Signature Wallets with MPC) However,

Read More
Meltdown and Spectre – divide and conquer

Security experts recently revealed two computer flaws called Meltdown and Spectre, serious vulnerabilities that threaten data by targeting modern microprocessors. This blog post discusses cryptographic protection called Multi-Party Computation (MPC), a way of mitigating the attack vectors by distributing vulnerable data onto different servers, a so-called "divide and conquer" strategy.

Read More