Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

MPC Protocol

Sui validators use several MPC protocols for realizing a threshold schnorr signer: Distributed Key Generation for generating a key, Key Rotation for redistributing the key on committee changes, and a distributed signing protocol for signing transactions. Those protocols are parametrized by two parameters, f and t, such that hashi can operate as long as <f of the staking power is not responsive (“liveness”), and is secure as long as <t of the staking power is colluding. In the first version of hashi we expect t to be in the range of 33%-50% and f in the range of 20%-33%. Those values may increase in future versions of hashi. The protocols are based on prior published work, modified and improved by our crypto team.

In addition to the MPC signer, hashi will also use a second signer implemented with a cloud enclave that enforces policies independently of the MPC protocols, reducing the risk of collusion or supply chain attacks.