Skip to main content

Institution-Grade MPC Key Management

A complete playbook for teams that custody significant value — exchanges, asset managers, DAOs, and enterprise treasury operations. Each topic is its own page so you can jump directly to what you need.


Who this is for

This guide assumes you need a documented, auditable, multi-party custody policy. If you're building a simple wallet app, the basic export & import example is enough.


Core principle

An institution never relies on a single MPC node or a single person. Every design decision in this guide enforces three properties:

  • Separation of duties — no individual can act alone on key material
  • Geographic distribution — no single physical breach can expose a complete key
  • Layered encryption — every sensitive artifact has multiple independent protection layers

Lifecycle at a glance

┌─────────────────────────────────────────────────────────────┐
│ │
│ 1. Ceremony → generate 2-of-3 shares, persist keyId │
│ 2. Custodians → local age keygen + SSS split of age key │
│ 3. Export → deleteAfterExport:true — nodes go empty │
│ 4. Sign → JIT import → sign → delete again │
│ 5. Rotate → local re-wrap, no age key leaves device │
│ 6. Recover → SSS reconstruct → RECOVER_PRIVATE_KEY │
│ │
└─────────────────────────────────────────────────────────────┘

Roles

RoleResponsibilityCount
Key GeneratorRuns the generation ceremony, stores keyId1 (server / CI)
CustodianHolds one encrypted MPC shard in cold storage3 (A, B, C)
GuardianHolds one SSS share of a custodian's age key3–5 per custodian
Quorum ApproverAuthorizes sensitive operations (recovery, rotation)2-of-3 Custodians
AuditorReviews logs; no key access1+

Pages in this guide

PageWhat you'll learn
Key Generation CeremonyGENERATE_KEY_SHARE, threshold config, keyId persistence
Custodian Setup & Shamir Secret SharingLocal age-keygen, AES-256-GCM passphrase protection, SSS split
Export, Rotation & RestoreJIT node model, local re-wrap, import/export cycle, full lifecycle
Disaster Recovery & Attack Prevention5 failure scenarios, 6 threat vectors, pre-launch policy checklist

Component reference

All MPC components used in this guide are documented in the MPC & Key Management section of the Component Library.