5
Min Read

MPC vs. Multi-sig Wallets: An Overview

Ray Chen
Product Manager
March 8, 2023
MPC vs. Multi-sig Wallets: An Overview
Update
Since this post was written, Hyperledger FireFly has reached 1.0. Learn more here!

Wallets are a necessity to secure digital assets on a blockchain wallet. A wallet serves as a digital container that holds cryptographic keys used to access, send, and receive digital assets. In a previous blog, we did an overview of common wallet types and in this article we will focus on Multi-signature (multisig) and multiparty computation (MPC) wallets. These are two types of cryptocurrency wallets that offer enhanced security features compared to traditional wallets.

The key difference between MPC and multi-sig wallets is in the signature process. A multi-signature wallet employs separate signatures from different private keys for security, while MPC generates just one signature, irrespective of how many shards of the private key contribute. Both approaches necessitate multiple parties to authorize a transaction.

Below we'll outline the advantages and disadvantages of each type of wallet and help you decide which is right for your use case.

Multi-signature Wallets

A multi-signature wallet is a type of cryptocurrency wallet that requires multiple parties to sign off on transactions before they can be executed. This means that in order to make a transaction, multiple individuals must provide their digital signature, adding an extra layer of security. As an analogy, a multi-signature wallet is like a board of directors where all parties have to give their stamp of approval to approve a major transaction.

How Multi-sig Wallets Work

Multi-sig wallets have a variety of m-of-n schemes where m out of n parties must sign off on a transaction. The most common implementations are 2-of-3 and 3-of-5 which offer strong security while also balancing simplicity.

Image illustrates how multis wallets work

The chart above does a good job of explaining the nuances. 1-of-1 is simply a regular wallet where only 1 private key is needed to transact. 1-of-n are setups if you want to share the wallet with other trusted parties and schemes where m=n require a full quorum to transact. As seen here, it is up to you to define the proper implementation for your use case.

To give an example, suppose there are three users (Annie, Bob, and Chris) who have created a multisig wallet and agree that at least two of them must approve any transaction. This would be a 2-of-3 example and each of them would have their own cryptographic key with a unique address generated for their multisig account.

If Annie decides that she wants to send digital assets from the wallet, a transaction is initiated and sent to the other users for approval. In this case, Annie would be an approval signature and one of either Bob or Chris would need to approve for the transaction to go through. If approved the digital assets are transferred, if it is denied the transaction is cancelled.

Advantages of Multi-sig Wallets

  • Increased security: Multisig wallets provide an additional layer of security as multiple parties are required to approve transactions.
  • Reduced risk of single point of failure: As the wallet requires multiple signatures to execute transactions, the risk of a single compromised key resulting in funds loss is reduced.
  • Customizable approval process: Users can set the number of signatures required to approve a transaction, and the number can be changed at any time.

Disadvantages of Multi-sig Wallets

  • Increased complexity: As there are multiple parties involved, the process of creating and using a multisig wallet can be more complicated than a traditional single-signature wallet.
  • Protocol support: Only certain protocols support multi-sig wallets and those that do have different implementations which many require new code leading to potential security vulnerabilities.
  • Inflexibility: The m-of-n definition is defined to the wallet and thus you will need to add or revoke key shares as member parties join or leave an organization
  • Higher transaction fees: Addresses are generated on-chain meaning every wallet creation, address creation, signature, etc. requires a transaction fee from each use.

Multiparty Computation (MPC) Wallets

MPC wallets use a technique called multi-party computation (MPC) to secure transactions. MPC splits a private key into multiple encrypted shares that are divided among multiple parties. Each of these parties holds a part of the key that when joined with the others, enables transactions to be done with the wallet. While this seems similar to multi-sig wallets, a key differentiator is that these encrypted shares may be dynamic and divided between several devices. For example, shares of the private key may be single use with time expiration similar to how 2FA authenticators work today.

How MPC Wallets Work

Let’s go back to our example with three users (Annie, Bob, Chris) who have created a MPC wallet. The MPC wallet then splits the private key into three shares with each party holding one share.

Suppose there are three users (A, B, and C) who want to create an MPC wallet. They each create a unique cryptographic key and then use an MPC algorithm to generate a set of shared cryptographic keys. These shared keys are then used to create a unique wallet address.

When one of the users wants to send digital assets from the wallet, they initiate a transaction using their individual cryptographic key. The transaction is then split into multiple pieces and sent to the other users, who use their individual keys to verify and approve the transaction.

The MPC algorithm is then used to combine the approved transaction pieces and execute the transaction. The cryptographic keys are never shared or revealed, ensuring that no single user has complete control over the wallet.

Advantages of MPC Wallets

  • Increased security: MPC wallets provide a high level of security by ensuring that no single party has complete control over the wallet.
  • Reduced risk of attack: As the cryptographic keys are never shared, the risk of key theft or attack is significantly reduced.
  • Flexibility: MPC algorithms can be designed to accommodate any number of parties, making it a flexible solution for digital asset management.

Disadvantages of MPC Wallets

  • Complexity: As with multi-signature wallets, MPC wallets are more complex to create and use than traditional single-signature wallets.
  • Limited availability: MPC technology is still in its infancy, and there are few providers of MPC wallets in the market.

Key Differences Between Multi-signature and MPC Wallets

While both multi-signature and MPC wallets are designed to provide a high level of security for digital asset management, there are some key differences between the two.

Method of Authentication

Multi-signature wallets use a method of authentication where multiple parties must provide their signatures to approve a transaction. MPC wallets, on the other hand, use a complex mathematical algorithm to securely generate and store cryptographic keys.

Number of Signatures Required

Multi-signature wallets require a pre-determined number of signatures to execute a transaction. MPC wallets do not require multiple signatures but instead use a distributed key generation process that ensures no single party has complete control over the wallet.

Availability

Multi-signature wallets are widely available and are supported by many blockchain networks. MPC wallets, on the other hand, are relatively new and are only offered by a few providers.

Complexity

Both multi-signature and MPC wallets are more complex to create and use than traditional single-signature wallets. However, multi-signature wallets are generally considered to be easier to set up and use compared to MPC wallets.

Final Thoughts

Both multi-signature and MPC wallets offer a high level of security for digital asset management. While multi-signature wallets provide increased security by requiring multiple signatures to approve a transaction, MPC wallets use a distributed key generation process to ensure that no single party has complete control over the wallet. The choice between the two ultimately comes down to the specific needs and preferences of the user. It's essential to consider factors such as the number of parties involved, the level of security required, and the complexity of use before selecting a wallet type.

Interested in Blockchain?

Start learning blockchain and creating enterprise solutions today with a free Kaleido account!

Create Free Account
Don't forget to share this article!
Interested in Blockchain?

Start learning blockchain and creating enterprise solutions today with a free Kaleido account!

Create Free Account

The Ultimate Enterprise Blockchain Glossary

Your guide to everything from asset tokenization to zero knowledge proofs

Download Now

Swift Utilizes Kaleido in New CBDC Sandbox

Learn how Swift, the world’s leading provider of secure financial messaging services, utilizes Kaleido in its CBDC Sandbox project.

Download Now

Related Posts

Digital Asset Custody: An Enterprise Guide

Mastering Digital Asset Custody: Your Guide to Securely Managing Assets

Marc Lewis
Managing Editor
Asset Tokenization on Blockchain: The Enterprise Guide

Asset Tokenization: Unlocking New Possibilities for the Enterprise

Marc Lewis
Managing Editor
How To Build A Blockchain (In 5 Simple Steps)

How To Build A Blockchain (In 5 Simple Steps)

Marc Lewis
Managing Editor

Blockchain made radically simple for the enterprise

No Credit Card Required
ISO27K & SOC2 Type 2 Compliant
Free Training & Support