Private keys are the trust primitive of the internet. Every cryptographic system — blockchain wallets, TLS certificates, API authentication, code signing — ultimately relies on a secret that someone holds.
The single-key model has an obvious failure mode: whoever holds the key controls everything, and losing it means losing everything. Multi-Party Computation (MPC) distributes this trust — requiring agreement from multiple parties before a signature is produced — without requiring those parties to reconstruct the key in any single location.
Hanzo MPC brings this capability to AI-native applications.
What Hanzo MPC Provides
CGGMP21 — The current standard for threshold ECDSA. Produces signatures compatible with Ethereum, Bitcoin, and all major blockchain networks. The protocol is provably secure under standard assumptions without requiring a trusted setup.
FROST — Fast Round-Optimized Schnorr Threshold signatures. Used for Schnorr-compatible chains (Bitcoin Taproot, Solana, Polkadot) and systems that need minimum-round signing latency.
LSS (Linear Secret Sharing) — The foundation layer enabling flexible threshold schemes (t-of-n) for distributed key generation and share refresh.
The AI Agent Use Case
When an AI agent needs to authorize a transaction — signing a blockchain transaction, authenticating to an API, committing to a smart contract — who holds the key?
The traditional answer is: the service running the agent. But agents increasingly operate across multi-tenant environments, across organizations, and with delegated authority from users who need to be able to revoke that authority.
MPC provides a better answer: the agent's signing authority is held jointly across multiple parties — the user, the operator, and optionally a third-party guardian. No single party can authorize a transaction unilaterally. Any party can revoke access by refusing to participate in signing.
This is the security model that AI agents operating on behalf of users — managing wallets, executing DeFi positions, authorizing purchases — actually need.
Infrastructure, Not Library
Hanzo MPC is deployed as infrastructure, not a library you integrate into your application. Your application makes signing requests to the MPC service; the service coordinates the multi-party protocol and returns a signature. The key material never leaves the MPC nodes.
This means you get MPC security without running MPC protocol code in your application layer — and without your application servers ever having access to key shares.
Available now at github.com/hanzoai/mpc.
Read more
Threshold Signatures: Trust Distributed
How we implemented threshold signatures to eliminate single points of failure in key management.
Preparing for Q-Day: Lattice-Based Cryptography
How we're preparing Lux for quantum computers with lattice-based cryptography.
Hanzo Vault: PCI-Compliant Card Tokenization for AI Commerce
Hanzo Vault is a PCI-compliant card tokenization service — isolating cardholder data from your application so you handle tokens, not sensitive payment information.