Skip to main content

· One min read
Julie

We updated the Switch organization page for faster navigation between your different organizations. Additionally, there is a "Join" button next to any organization you've been invited to, making it easier to locate and accept invitations. Read on to learn more about how to invite members to organizations.

join organization example

· One min read
Julie

As PayPal USD (PYUSD) makes a blast on the Solana network, we're excited to announce that MPCVault is adding support for Token-2022, Solana’s advanced token standard. We are proud to be among the first custodians to support Token Extensions on Solana, bringing you a world of new possibilities beyond the original SPL tokens and enabling seamless management of PYUSD and other innovative digital assets.

MPCVault now supports Solana's Token-2022 standard

· One min read
Julie

Our latest update adds support for the TON network – start sending and receiving Toncoins(TON) and Jettons right away!

For a full list of supported assets, visit our website.

Docusaurus Plushie

What is TON?

The Telegram Open Network (TON) is a blockchain platform originally developed by the team behind the popular messaging app, Telegram. Designed to enable fast transactions and decentralized applications at scale, TON aims to facilitate everyday use of cryptocurrencies and blockchain technology. At its core, the TON network employs a unique consensus mechanism called Proof-of-Stake (PoS), which enhances security and efficiency while maintaining high throughput.

TON's architecture supports the creation and execution of smart contracts, allowing developers to build decentralized applications (dApps) that leverage the platform’s speed and scalability. A key feature of the TON ecosystem is its native cryptocurrency, Toncoin (TON), which serves as the primary means of transaction within the network. Additionally, TON supports Jettons, which are custom tokens built on the platform, further expanding its utility and flexibility for various digital assets and services. With MPCVault, you can easily manage and transact in both Toncoin and Jettons, offering a secure and efficient solution for all your TON network requirements.

· 4 min read
Webster

As briefly mentioned in the previous article on the broad overview of secure multiparty computation, homomorphic encryption is one way to achieve secure Multiparty Computation (MPC). It is widely used to implement various MPC algorithms.

Homomorphic Encryption Definition

Let

y=f(x1,x2,...,xn)y = f(x_1, x_2, ..., x_n)

where ff is a function to be computed and x1,...,xnx_1, ..., x_n are the inputs.

encenc is a homomorphic encryption function if:

enc(f(x1,x2,...,xn))=f(enc(x1),enc(x2),...,enc(xn))enc(f(x_1, x_2, ..., x_n)) = f(enc(x_1), enc(x_2), ..., enc(x_n))

In other words, homomorphic encryption functions allow one to perform computations on encrypted data. However, computation on the encrypted data gives you encrypted outputs, which are not useful unless they can be decrypted to produce sensible values. Therefore, homomorphic encryption functions need to come with a corresponding decryption function that can be used to recover the final encrypted results.

Let's denote the decryption function as decdec, we should have the following relation:

dec(enc(f(x1,x2,...,xn)))=dec(f(enc(x1),enc(x2),...,enc(xn)))=f(x1,x2,...,xn)\begin{align*} dec(enc(f(x_1, x_2, ..., x_n))) &= dec(f(enc(x_1), enc(x_2), ..., enc(x_n))) \\ &= f(x_1, x_2, ..., x_n) \end{align*}

Finding a pair of encryption and decryption functions (encdecenc-dec) that would work perfectly regardless of what function ff is can be challenging. However, it is possible to create homomorphic encryption functions when restrictions are added to the form of function ff.

For example, suppose function ff can only consist of multiplications. The following set of homomorphic encryption-decryption functions might just work:

enc(x)=xemodndec(x)=xdmodnenc(x) = x^e \mod n \\ dec(x) = x^d \mod n

Where ee, dd and nn are some carefully chosen numbers so that (xe)d=xmodn(x^e)^d = x \mod n for any given xx. For the curious readers, please refer to this WikiPedia page to learn about how these numbers are generated to satisfy the above equation.

To illustrate how this works, let's consider a simple function f(x1,x2,x3)=x1x2x3f(x_1, x_2, x_3) = x_1 * x_2 * x_3 that only consists of multiplications. It is clear that:

f(enc(x1),enc(x2),enc(x3))=f(x1emodn,x2emodn,x3emodn)=(x1emodn)(x2emodn)(x3emodn)=x1ex2ex3emodn=(x1x2x3)emodn=f(x1,x2,x3)emodn=enc(f(x1,x2,x3))\begin{align*} f(enc(x_1), enc(x_2), enc(x_3)) &= f(x_1^e \mod n,x_2^e \mod n, x_3^e \mod n) \\ &= (x_1^e \mod n) * (x_2^e \mod n) * (x_3^e \mod n) \\ &= x_1^e * x_2^e * x_3^e \mod n \\ &= (x_1 * x_2 * x_3)^e \mod n \\ &= f(x_1,x_2,x_3)^e \mod n \\ &= enc(f(x_1,x_2,x_3)) \end{align*}

This fulfills the requirement that enc(f(x1,x2,...,xn))=f(enc(x1),enc(x2),...,enc(xn))enc(f(x_1, x_2, ..., x_n)) = f(enc(x_1), enc(x_2), ..., enc(x_n)).

For the decryption process:

dec(f(enc(x1),enc(x2),enc(x3)))=dec(f(x1,x2,x3)emodn)=(f(x1,x2,x3)emodn)dmodn=(f(x1,x2,x3)e)dmodn=f(x1,x2,x3)modn\begin{align*} dec(f(enc(x_1), enc(x_2), enc(x_3))) &= dec(f(x_1,x_2,x_3)^e \mod n) \\ &= (f(x_1,x_2,x_3)^e \mod n)^d \mod n\\ &= (f(x_1,x_2,x_3)^e)^d \mod n\\ &= f(x_1,x_2,x_3) \mod n \end{align*}

We can indeed recover the correct result of multiplication from the output of computing function ff on the encrypted inputs.

The homomorphic system above, called unpadded RSA (since it leverages the RSA cryptosystem), is one example of the so-called partially homomorphic crypto systems. As the name suggests, they are "partial" because they don't work on any arbitrary function ff. There are many other partially homomorphic crypto systems which you can find here.

Homomorphic Encryption and Secure Multiparty Computation

Now you might wonder: how does homomorphic encryption help us achieve secure multiparty computation? The answer to this question requires some creativity as you would have to utilize homomorphic encryption in different ways under different circumstances. Let's illustrate with an example based on the unpadded RSA homomorphic crypto system.

Consider three people Alice, Bob and Charlie each holding on to some number aa, bb, cc that they wish to keep secret. They want to collectively compute the product of their numbers without revealing their individual numbers to each other. Their objective could be reached with the kind help of two other people Sarah and Nancy.

They proceed as follows:

  1. Sarah generates the unpadded RSA decdecdec-dec pair, and sends the encenc function to Alice, Bob and Charlie.
  2. Alice, Bob and Charlie compute a=enc(a)a' = enc(a), b=enc(b)b' = enc(b), $c' = enc(c)` respectively and send them to Nancy.
  3. Nancy multiplies the numbers she received from Alice, Bob and Charlie to obtain d=abcd' = a' * b' * c', and send dd' back to Sarah.
  4. Sarah then computed d=dec(d)d = dec(d') and sends it back to Alice, Bob and Charlie.

Now, dd is really just the multiplicative product abca * b * c.

In the above procedure, none of Alice, Bob and Charlie revealed their secretive numbers to anyone else but all of them learned the multiplicative product of the numbers they had.

· One min read
Julie

MPCVault has once again secured the globally recognized SOC 2 Type II certification for 2024, attesting to our robust information security compliance. This certification underscores why we have become one of the most trusted solutions in the DeFi space. Thousands of companies, including leading exchanges, crypto venture capitals, and Web3 firms, rely on our platform for crypto asset management across different chains. We remain committed to maintaining stringent security measures and ensuring the utmost protection of your crypto assets.

MPCVault is SOC 2 certified for 2024

· 5 min read
Eddy

In the fast-expanding universe of cryptocurrencies, TRON (TRX) stands out as a dynamic blockchain platform designed for digital content creators and consumers. With its growing popularity, ensuring the security and efficiency of your TRON wallet is paramount to safeguard your digital assets and maximize their potential. This article delves into best practices, innovative features, and savvy tips to help you navigate the TRON ecosystem like a pro.

Understanding Your TRON Wallet

A TRON wallet serves as the gateway to your digital currencies and assets on the TRON blockchain. Whether it's a software wallet like TronLink or Trust Wallet, a secure hardware option like Ledger, or the traditional, yet less common, paper wallet—each offers unique advantages. For example, software wallets offer convenience and instant access, while hardware wallets provide an extra layer of security for your TRX. Understanding key elements, such as private keys—a string of characters that denote ownership and should be kept confidential—and public addresses, which you share to receive TRX, are the bedrock of managing your TRON assets efficiently and securely.

Setting Up Your TRON Wallet Securely

When you're ready to join the ranks of cryptocurrency enthusiasts, setting up your TRON wallet securely should be your top priority. Begin by choosing a reputable wallet application that supports TRX. During setup, you will be prompted to create a passphrase — think of this as the master key to your wallet. A robust passphrase typically includes a mix of letters, numbers, and special characters that is difficult to guess.

The next crucial step is to make a secure backup of your wallet keys. If your device is lost or compromised, this backup is the only way to regain access to your funds. For added security, consider writing down your backup phrase and storing it in a safe or another secure location. Avoid storing it digitally where it could be susceptible to hacking. MPCVault makes sure you have your keys securely backed up before proceeding to the next step.

Regularly updating your wallet software is another vital practice for maintaining security. Developers constantly patch vulnerabilities, and staying up-to-date with the latest software helps protect your assets from new threats. Remember, in the TRON ecosystem, your wallet is your responsibility - treat it with the care and attention you would any valuable asset.

Fundamentals of TRON Wallet Security

Securing your wallet is just the beginning. As a TRON user, you must stay vigilant against potential threats. Phishing attacks, malicious software, and unsecured Wi-Fi networks are but a few of the dangers lurking in the digital world. Always verify that you are visiting the official TRON website or genuine wallet service platforms before entering sensitive information.

Employing two-factor authentication (2FA) can significantly increase the security of your wallet. It adds a layer of defense by requiring a second form of verification — usually a code sent to your mobile device.

Moreover, be conscious of the applications and smart contracts you interact with on the TRON network. Only use trusted dApps and perform due diligence before engaging with new platforms or services. Remember that a good reputation and transparent history are signs of reliability in the blockchain world.

Each step you take towards strengthening the security of your TRON wallet is a step towards sustained digital sovereignty. Your diligence is the ultimate shield against cyber threats in the cryptocurrency landscape.

Choosing a TRON Wallet with Secure Technology: Introducing MPCVault

When it comes to managing your digital assets, the security technology behind your TRON wallet should never be compromised. As cyber threats evolve, so should the protective measures of cryptocurrency wallets. One such advanced innovation is MPCVault, a wallet designed to provide exceptional security for your TRX holdings through cutting-edge Multi-Party Computation (MPC) technology.

MPCVault harnesses the power of Multi-Party Computation, a cryptographic protocol which allows multiple parties to jointly compute a function over their inputs while keeping those inputs private. In the context of a TRON wallet, this means that transaction signing is a cooperative process that requires consent from separate, independent key holders. As a result, MPCVault's security is dramatically enhanced, as a single compromised device does not result in lost assets or unauthorized transactions.

Furthermore, MPCVault is a multi-signature (multi-sig) wallet, requiring more than one signature to authorize a transaction. This adds an additional layer of security, making it nearly impossible for unauthorized users to move funds without collective approval. Despite these robust security features, MPCVault remains a self-custodial wallet, meaning that you, and only you, control the keys to your TRX. There's no need to trust a third party with your precious assets.

With its combination of MPC and multi-sig technology, MPCVault stands out as a premier choice for those seeking peace of mind without sacrificing control over their TRON wallet. Enjoy the benefits of enhanced security, user autonomy, and the flexibility of self-custody, all wrapped up in a user-friendly package designed to maximize the potential of your TRON investments. Choose security; choose MPCVault for your TRX assets.

· 4 min read
Eddy

The Need for Interoperability in Blockchain Technology

Interoperability is the capability of different blockchain networks to share, view, and access information across platforms without hindrance. This seamless interaction is crucial in a landscape where numerous standalone blockchain ecosystems have emerged, each with its unique features and protocols. Presently, the lack of interoperability presents considerable challenges. It hampers the widespread adoption of blockchain technology and restricts the potential for innovation.

Imagine if sending emails was restricted to users within the same email provider — this is the reality for many blockchain platforms. Interoperable blockchains would allow for the unrestricted flow of data and value, much like emails today, paving the way for new use cases that enhance efficiency and inclusivity in the global economy. Recognizing the importance of this, projects like Polkadot and Cosmos have championed the interoperability movement, creating ecosystems that enable different blockchains to communicate.

Integrating interoperable solutions is not just about data sharing; it's about expanding the applicability of blockchain technology to various industries, ranging from finance through DeFi (Decentralized Finance) to healthcare and beyond. As more businesses explore blockchain solutions, the demand for interoperable networks continues to grow, showcasing the need for cross-chain and multi-chain platforms to shape the future of blockchain integration.

What is Cross-Chain Technology?

Cross-chain technology is a pivotal breakthrough in the blockchain space, designed to facilitate interoperability and communication between disparate blockchain networks. Often described as the 'internet of blockchains', this technology enables the exchange of assets, information, and functionality from one independent blockchain to another. This is crucial as it allows for more complex value propositions and solutions that no single blockchain can provide on its own.

One concrete example of cross-chain interoperability is the Wrapped Bitcoin (WBTC) on the Ethereum blockchain. WBTC is a representation of Bitcoin as an ERC-20 token, allowing Bitcoin holders to engage with Ethereum's rich ecosystem of decentralized applications. Cross-chain platforms like Thorchain and Blocknet serve as bridges, fostering interoperability by enabling direct trading without the need for intermediaries.

With cross-chain technology, one can leverage the strengths of various blockchains — like Bitcoin's robust security and Ethereum's flexible smart contracts — creating syntheses that herald a new era of blockchain applications. As the blockchain continues to mature, cross-chain solutions are becoming increasingly pivotal in creating a truly interconnected network, unlocking the potential for widespread cryptocurrency adoption and usage.

What is Multi-Chain Technology?

Multi-chain technology embodies a design paradigm that encourages multiple blockchains to run in parallel, supporting a diverse ecosystem within a single network. This approach allows each chain to specialize in a particular function or use case, offering several advantages like enhanced scalability, flexibility, and customizable governance models. In essence, multi-chain architectures aim to create a network of connected yet independent blockchains that work cohesively to process transactions and data.

A prime example of multi-chain architecture is Avalanche, a platform where multiple subnets can operate as unique blockchains while still benefiting from the platform's overarching security and infrastructure. Each subnet can cater to specific industries or applications, offering the tailored performance and features needed without impacting the other chains in the network.

Another notable instance is Polygon (formerly Matic Network), which offers a framework for building and connecting Ethereum-compatible blockchain networks. By doing so, it helps to address the challenges of scalability and user experience without sacrificing the decentralization benefits that blockchain provides. Through this multi-chain approach, individual chains can optimize processing speed and cost-efficiency, while still being a part of a larger, interoperable ecosystem.

Cross-Chain vs. Multi-Chain: Technical and Other Differences

Although both cross-chain and multi-chain technologies aim to solve blockchain interoperability issues, they do so in fundamentally different ways. Cross-chain refers to the mechanisms that enable distinct blockchains to communicate directly or through a relay, facilitating the transfer of data and assets between them. This creates an interconnected network where individual blockchains retain their independence while still participating in a greater ecosystem.

On the other hand, multi-chain involves multiple blockchain networks built within a single framework or ecosystem, sometimes referred to as 'sidechains' to a 'mainchain'. This allows for customization and scalability while maintaining a coherent and unified infrastructure. Each blockchain within a multi-chain platform may serve a unique purpose or cater to specific performance requirements.

The key technical difference lies in the method of interoperability. Cross-chain technology often relies on bridge protocols or atomic swaps to facilitate exchanges, whereas multi-chain platforms use a native framework to support the simultaneous operation of multiple chains. From a functional perspective, multi-chain architecture can be advantageous for applications needing high throughput and customizability, while cross-chain solutions may be preferred for their ability to integrate different ecosystems without the need to adhere to a single protocol or standard.

· 4 min read
Eddy

In the fast-evolving world of blockchain technology, the terms Layer 1 and Layer 2 frequently surface in discussions about scalability and efficiency. But what do they signify? This article peels back the layers of blockchain's complex structure to reveal the distinctions, strengths, and limitations of Layer 1 and Layer 2. Whether you're a developer, investor, or simply a blockchain enthusiast, understanding these layers is vital for navigating the crypto-sphere with confidence.

What is Layer 1?

Layer 1 refers to the fundamental blockchain infrastructure on which various cryptocurrencies operate. It encompasses the original protocols that form a blockchain's architecture, including Bitcoin's proof-of-work mechanism and Ethereum's initial proof-of-stake concept. These foundational protocols are responsible for verifying transactions, achieving consensus, and adding new blocks to the network. However, Layer 1 solutions have scalability limits; as a network grows, transaction speed can decrease and costs can rise.

To illustrate, Bitcoin's blockchain can only handle around 7 transactions per second (TPS), which pales in comparison to traditional payment networks like Visa, which can process thousands of TPS. Ethereum, another popular Layer 1 blockchain, has experimented with solutions like Ethereum 2.0, which integrates sharding to divide the database to increase throughput.

The challenge for Layer 1 blockchains is to balance decentralization, security, and scalability, often referred to as the blockchain trilemma. Enhancements to Layer 1 protocols aim to maintain the decentralized nature of the network and its security while improving scalability. For example, alternative consensus mechanisms such as proof-of-stake (PoS) and delegated proof-of-stake (DPoS) are being adopted by newer blockchains like Cardano and EOS as innovative Layer 1 solutions to the trilemma.

What is Layer 2?

While Layer 1 is the core of any blockchain network, Layer 2 consists of off-chain (off the main blockchain) solutions that enhance a blockchain's scalability and transaction speed without necessitating changes to the actual Layer 1 blockchain. Layer 2 achieves this by handling transactions off the main chain and then recording them to Layer 1.

Popular Layer 2 solutions include Lightning Network for Bitcoin and Plasma and Optimistic Rollups for Ethereum. The Lightning Network allows users to transact with each other directly via channels without needing to record every transaction on the Bitcoin blockchain. This dramatically increases the potential TPS and reduces fees. On the Ethereum front, Optimistic Rollups provide a way to execute transactions off the main chain while still enjoying the security guarantees of the main chain.

These Layer 2 solutions are pivotal in enabling blockchains to scale by serving as complementary layers that process a large volume of transactions efficiently. This lessens the burden on Layer 1, allowing for more throughput and a better user experience without compromising on the decentralization or security that are hallmarks of blockchain technology. As these solutions evolve, they are becoming increasingly crucial for blockchain networks looking to compete with traditional financial systems.

Key Differences Between Layer 1 and Layer 2

Understanding the differences between Layer 1 and Layer 2 is pivotal for grasping blockchain scalability and security. While Layer 1 is the foundational blockchain protocol ensuring security and decentralization, Layer 2 works on top of Layer 1 to enhance transaction speed and efficiency. To make this comparison clearer, let's look at a table summarizing the core differences:

AspectLayer 1Layer 2
ScalabilityLimited; changes require protocol updates like Bitcoin’s SegWit.Higher; achieved by processing transactions off the main chain without altering Layer 1.
SpeedSlower due to the emphasis on consensus and decentralization.Faster as transactions are processed off-chain or through secondary channels.
CostsHigher transaction fees due to network congestion.Lower transaction fees by reducing the load on the main chain.
SecurityMore secure as it maintains the integrity of the blockchain.Relies on Layer 1 for foundational security but is still robust.
ExamplesBitcoin’s original blockchain, Ethereum pre-2.0 upgrades.Lightning Network for Bitcoin, Raiden Network, and Optimistic Rollups for Ethereum.

By comparing Layer 1 with Layer 2 side by side, it's evident that Layer 1 serves as the secure, decentralized foundation of a blockchain. In contrast, Layer 2 solutions offer scalable, efficient transaction handling by offloading work from the main chain. This two-tiered approach ensures that blockchains can maintain their core security features while addressing the growing need for speed and reduced costs in a burgeoning digital economy.