Product Update: Brand New Send Page on Mobile App
We gave a new look to the "Send" page on the mobile app, putting everything you need right at your fingertips: attach a note to your transaction or add recipients to notify via email.
We gave a new look to the "Send" page on the mobile app, putting everything you need right at your fingertips: attach a note to your transaction or add recipients to notify via email.
To ensure stable connections to dApps, we've upgraded the browser plugin by increasing the number of RPC nodes to up to 5. Enjoy uninterrupted experience on dApps with your MPCVault wallet.
We are proud to be a part of Alchemy's curated collection of most popular multisig wallets. You can find us cross-listed under 13 different ecosystems including Tron, Solana, and many more. Catch us on Alchemy's website.
MPCVault's plugin is now integrated with the TON blockchain, supporting the trading of all asset types in the TON ecosystem. To connect, click "Connect Wallet" in the dApp and select "TON Wallet".
We updated the Switch organization page for faster navigation between your different organizations. Additionally, there is a "Join" button next to any organization you've been invited to, making it easier to locate and accept invitations. Read on to learn more about how to invite members to organizations.
MPCVault now supports multi-transaction on Solana. You can now sign and submit multiple transactions in a single request, streamlining operations on dApps like Jupiter, Kamino, and Drift.
As PayPal USD (PYUSD) makes a blast on the Solana network, we're excited to announce that MPCVault is adding support for Token-2022, Solana’s advanced token standard. We are proud to be among the first custodians to support Token Extensions on Solana, bringing you a world of new possibilities beyond the original SPL tokens and enabling seamless management of PYUSD and other innovative digital assets.
We are proud to be a part of Alchemy's curated collection of most popular multisig wallets. You can find us cross-listed under 13 different ecosystems including Tron, Solana, and many more. Catch us on Alchemy's website here.
Our latest update adds support for the TON network – start sending and receiving Toncoins(TON) and Jettons right away!
For a full list of supported assets, visit our website.
The The Open Network (TON) is a blockchain platform originally developed by the team behind the popular messaging app, Telegram. Designed to enable fast transactions and decentralized applications at scale, TON aims to facilitate everyday use of cryptocurrencies and blockchain technology. At its core, the TON network employs a unique consensus mechanism called Proof-of-Stake (PoS), which enhances security and efficiency while maintaining high throughput.
TON's architecture supports the creation and execution of smart contracts, allowing developers to build decentralized applications (dApps) that leverage the platform’s speed and scalability. A key feature of the TON ecosystem is its native cryptocurrency, Toncoin (TON), which serves as the primary means of transaction within the network. Additionally, TON supports Jettons, which are custom tokens built on the platform, further expanding its utility and flexibility for various digital assets and services. With MPCVault, you can easily manage and transact in both Toncoin and Jettons, offering a secure and efficient solution for all your TON network requirements.
As briefly mentioned in the previous article on the broad overview of secure multiparty computation, homomorphic encryption is one way to achieve secure Multiparty Computation (MPC). It is widely used to implement various MPC algorithms.
Let
where is a function to be computed and are the inputs.
is a homomorphic encryption function if:
In other words, homomorphic encryption functions allow one to perform computations on encrypted data. However, computation on the encrypted data gives you encrypted outputs, which are not useful unless they can be decrypted to produce sensible values. Therefore, homomorphic encryption functions need to come with a corresponding decryption function that can be used to recover the final encrypted results.
Let's denote the decryption function as , we should have the following relation:
Finding a pair of encryption and decryption functions () that would work perfectly regardless of what function is can be challenging. However, it is possible to create homomorphic encryption functions when restrictions are added to the form of function .
For example, suppose function can only consist of multiplications. The following set of homomorphic encryption-decryption functions might just work:
Where , and are some carefully chosen numbers so that for any given . For the curious readers, please refer to this WikiPedia page to learn about how these numbers are generated to satisfy the above equation.
To illustrate how this works, let's consider a simple function that only consists of multiplications. It is clear that:
This fulfills the requirement that .
For the decryption process:
We can indeed recover the correct result of multiplication from the output of computing function on the encrypted inputs.
The homomorphic system above, called unpadded RSA (since it leverages the RSA cryptosystem), is one example of the so-called partially homomorphic crypto systems. As the name suggests, they are "partial" because they don't work on any arbitrary function . There are many other partially homomorphic crypto systems which you can find here.
Now you might wonder: how does homomorphic encryption help us achieve secure multiparty computation? The answer to this question requires some creativity as you would have to utilize homomorphic encryption in different ways under different circumstances. Let's illustrate with an example based on the unpadded RSA homomorphic crypto system.
Consider three people Alice, Bob and Charlie each holding on to some number , , that they wish to keep secret. They want to collectively compute the product of their numbers without revealing their individual numbers to each other. Their objective could be reached with the kind help of two other people Sarah and Nancy.
They proceed as follows:
Now, is really just the multiplicative product .
In the above procedure, none of Alice, Bob and Charlie revealed their secretive numbers to anyone else but all of them learned the multiplicative product of the numbers they had.