Imagine that two millionaires, Alice and Bob, want to know which one of them has more money—but neither wants to tell the other one how much money they have. Finding out the correct answer to “Who's richer?" while still maintaining their privacy is challenging, but not impossible. In fact, it's a classic problem known as “The Millionaires' Problem," 1 and the solution is what forms the basis for an idea known as multi-party computation (MPC), which plays a key role in secure crypto custody solutions.
Read on to learn more about this key aspect of crypto that combines two of the field's most important advantages: security and privacy.
Using a cryptographic protocol, MPC allows multiple parties to work together to solve a problem without revealing any of the parties' private information. By ensuring the confidentiality of any inputs, it encourages collaboration and helps all parties come to a solution.
Let's go back to the Millionaires' Problem, where Alice and Bob want to compare their wealth without revealing it to each other. To use the principles of MPC, each party would first break down their total wealth into smaller amounts, undisclosed to each other. On those smaller amounts they would then perform a number of computational steps. By taking advantage of cryptography, the computations would be done in a secure way that would help preserve the privacy of the inputs.
After making those calculations to encrypt the information, then Alice and Bob would be able to use a secure comparison protocol that offers the answer to their question—who's richer?—without revealing anyone's specific inputs.
The “input" or private information that a crypto user holds is their “private key," which is needed to access and sign the user's digital assets and make transactions.
In some cases, the private key held is kept whole and online—and that can leave users vulnerable to attacks. If their digital wallet is compromised, their private key can be compromised as well, leading to potentially devastating outcomes.
That's where the principles of multiparty computation come in. For MPC wallets, the technique will break down the private key into smaller shares, and then encrypt each of those elements—just like in the Millionaires' scenario, where Alice and Bob broke down their total wealth into smaller amounts and encrypted them—before distributing the smaller elements across multiple places. That way, the underlying information is kept secure. When the user needs to access the key, a special protocol allows the underlying elements to be “reconstructed" into its full form—once again, without revealing any private information.
This process enhances security by adding extra layers of protection. A single point of failure will no longer compromise crypto custody and access.
MPC wallets have not yet been widely adopted, perhaps because of their increased complexity combined with the fact that not all wallet providers offer the technology yet.2 However, their extra layers of security may make them increasingly appealing to larger organizations such as financial institutions.
In addition to digital asset storage and transfers, MPC techniques also have many practical applications when it comes to understanding large datasets while keeping private users' information confidential.
Thanks to these advantages, MPC techniques may have the potential to be employed in a wide variety of use cases from electronic voting3 that offers accurate outcomes while keeping individual votes private, to targeted digital advertising4 that results in a company's ability to sell more personalized online ads without having to share the individual user's data.
The future is exciting, as new ways to use MPC emerge that make our digital world more private and more secure at the same time.