How Multi-Party Computation splits private keys across parties to reduce single points of failure in autonomous agent systems.
MPC (Multi-Party Computation) custody is a cryptographic approach to digital asset storage where a private key is mathematically divided into multiple shares. These shares are distributed among separate parties or devices. No single party ever possesses the complete key, and a predefined threshold of shares must cooperate to produce a valid blockchain signature. This architecture eliminates the concentration of risk at any single location while maintaining compatibility with standard blockchain signature verification.
The process begins with distributed key generation. Multiple participants jointly create the key shares through an interactive protocol. At no point does anyone see the full private key or another participant's share. The shares are typically generated using protocols based on Shamir's Secret Sharing or more advanced threshold signature schemes such as GG20, GG21, or CMP.
When a transaction needs to be signed, the required number of share holders—meeting the threshold—participate in a multi-round protocol. Each party contributes partial computations using their share. These partial results are combined to produce a single standard signature that is indistinguishable on-chain from a signature created with a conventional private key. The blockchain requires no special support; it verifies the signature normally.
The separation of shares provides containment if one party is compromised. An attacker who obtains a single share cannot sign transactions or reconstruct the key. For autonomous agents, this means that compromising the agent's runtime environment does not automatically grant control of funds. The agent typically holds one share, while the provider, a hardware security module, or the end user holds others. The blast radius of a breach is limited to the operations requiring that specific share, not full asset control.
Several products in the agentwallet.md directory use MPC custody. These implementations vary in threshold configuration, share distribution, and which party controls what: