Key Shares
The two key shares are:- User Share: stored on the user’s device, protected by their passkey and biometrics. Acts like a hot wallet for immediate signing.
- Para Share: stored in Para’s cloud hardware security modules (HSMs). Provides a secure off-device backup and enables recovery.
MPC Implementation
Para uses the DKLS19 MPC algorithm, leveraging an for core functions including distributed key generation (DKG), signing ceremonies, and non-custodial wallet generation. Distributed Key Generation (DKG): When a user creates a wallet, Para initiates a DKG process that generates the User Share and Para Share without ever assembling the full private key. This ensures no single party has access to the complete key, even during generation. Signature structure: Para uses the EIP-712 transaction signature interface. For Ethereum-based integrations, Para publishes an EIP-1193 Provider, most commonly used via Wagmi Connectors.Hardware Secure Enclaves and Passkeys
Modern devices include hardware secure enclaves: dedicated, isolated processors for storing and protecting sensitive data. These enclaves support the secp256r1 elliptic curve, while most blockchains use secp256k1. Para bridges this gap by generating a passkey (secp256r1) stored in the device’s secure enclave. This passkey authorizes access to the Para Share, which then participates in a secp256k1 signing ceremony. The result: users authenticate with device-native biometrics (Face ID, fingerprint, etc.) while the system produces blockchain-compatible signatures.| Property | Details |
|---|---|
| Hardware-level protection | Authentication key lives in the device’s secure enclave, isolated from the OS |
| Biometric confirmation | Every sensitive operation requires physical presence via Face ID, fingerprint, or device PIN |
| WebAuthn compliance | Passkeys follow the WebAuthn standard for phishing-resistant authentication |
MPC vs Multi-sig
| MPC | Multi-sig | |
|---|---|---|
| How it works | Splits a single private key across multiple parties. Parties jointly compute a signature without ever reconstructing the key | Requires multiple separate private keys to approve a transaction. Each key is complete on its own |
| Key exposure | The full key never exists in memory at any point | Each individual key is a complete private key that could be compromised independently |
| On-chain footprint | Produces a standard single signature, indistinguishable from a regular wallet | Requires a smart contract or multi-sig scheme visible on-chain |
Key Management FAQs
How is Para's Multi-Party Computation (MPC) implemented?
How is Para's Multi-Party Computation (MPC) implemented?
Para uses the DKLS19 MPC algorithm and leverages an open-source implementation for core functions like distributed key generation, signing ceremonies, and non-custodial wallet generation.
What signature structure does Para use?
What signature structure does Para use?
Para uses the EIP-712 transaction signature interface. Para also publishes an EIP-1193 Provider, most commonly used via Wagmi Connectors, ensuring compatibility with a wide range of Ethereum-based applications and tools.
How does Para handle key storage and biometric confirmation?
How does Para handle key storage and biometric confirmation?
The biometric key is stored on-device in a secure enclave. For Ethereum-based transactions, Para uses secp256k1 curve signatures. The secure enclave supports the secp256r1 curve, so Para generates a secp256r1 key that authorizes a secp256k1 curve signature for ECDSA signatures, bridging this compatibility gap securely.
What's the difference between MPC and a multi-sig?
What's the difference between MPC and a multi-sig?
Multi-sigs require separate private keys to approve a transaction. MPC splits a single private key across multiple parties, and parties jointly sign without ever reconstructing the key. Para can also serve as signer infrastructure on a multi-sig setup using Safe or ERC-4337 smart accounts.
Security & Trust Model
Full security overview including authentication, encryption, and audits
Wallet Recovery
How key shares are recovered after device loss