Download PDF version Contact company

Fireblocks announces it has developed a new MPC (secure multi-party computation) algorithm that pushes digital asset transaction speeds up to 8X faster than what’s currently possible.

Fireblocks’ new protocol, called ‘MPC-CMP,’ is based on and surpasses the speed of Gennaro and Goldfeder’s protocol, a current industry standard for MPC, and Lindell et al.’s protocol. Starting today, all digital asset custodians and MPC vendors can access Fireblocks’ MPC-CMP protocol and use it for free as Fireblocks will not be applying for patents on this technology.

Advanced fintech platforms

MPC-CMP enables them to execute high-volume withdrawal requests

MPC technology is allowing advanced fintech platforms to flourish because it removes the single point of compromise by transforming private keys into liquid form through securely distributed transaction signing. In an academic paper released recently by the Fireblocks Research Team, Prof. Ran Canetti, Dr. Nikolaos Makriyannis, and Udi Peled, revealed the new cryptographic security protocol. In the paper, Canetti, Makriyannis, and Peled (CMP) outline how to securely cut the number of rounds needed to sign an MPC transaction by 10-fold.

While Gennaro and Goldfeder’s algorithm requires 9 rounds to sign a transaction, MPC-CMP only requires 1. Designed to support institutions with large retail customer bases, such as the biggest exchanges, lending providers, and banks. MPC-CMP enables them to execute high-volume withdrawal requests. Additionally, it allows institutions located in areas with strong regulations around cold storage to utilise MPC in an offline wallet.

Next generation of threshold cryptography

By slicing the number of interactive rounds in half and combining the method of pre-processing with non-interactive signing, MPC-CMP accomplishes 8X faster transaction speed. “The MPC-CMP algorithm developed by our cryptography team is ushering in the next generation of threshold cryptography,” said Ran Canetti, Professor of Computer Science at Boston University and Tel Aviv University.

It demonstrates that strong security need not compromise on efficiency.” The new algorithm introduces major security improvements, such as automatically refreshing key shares in minute intervals, protections against more advanced attackers, and an out-of-the-box Universally Composable secure computation proof.

Operationalise digital asset services

As financial institutions look to launch and operationalise digital asset services, we believe MPC-based technology will be paramount to delivering an experience comparable to the speed of traditional assets,” explains Michael Shaulov, CEO and Co-Founder of Fireblocks. “We’re freely providing custodians and MPC vendors with our new algorithm to drive innovation, boost adoption, and prepare digital assets for the broader institutional market.”

MPC-CMP delivers:

  • The fastest digital asset transaction signing protocol on the market
  • Cold/offline MPC key signing
  • Automatic key share refreshing to improve security
  • Universally Composable protocol
  • 100% free usage

Fireblocks has made MPC-CMP open to peer review to ensure its strength and efficiency in order to implement the new algorithm by end of Q2 2020.

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?