Digital Asset Security Infrastructure

Lock-Keeper

By Bolt Labs

Lock-Keeper digital asset security infrastructure removes roadblocks for developers, letting them extend the right balance of control and utility to their users. Because there’s no such thing as a “low-value” digital asset to those who rely on them.

Extraordinary protection.

For every asset

Most digital asset security solutions require deep knowledge of cryptography in order to implement. And, in addition to being complex, they add overhead and expense. This leaves many developers (and their users) unprotected because the industry under-appreciates the “everyday” transaction.

Lock-Keeper from Bolt Labs solves this with a flexible, extensible, and easily-implemented plug-and-play solution to protecting user keys.

Cartoon gamer sitting at a computer desk

With Lock-Keeper

Key custody is flexible

Both secure storage and key use can be user-controlled. Even in the event that a cloud provider is compromised, no user keys can be obtained.

Key protections is secure, redundant, & failsafe 

Private keys are stored securely using secure hardware in cloud-based trusted execution environments. This means protection against software and hardware attacks.

A finger pointing to a yellow dialogue box with the bBlt logo

Keys are gated with flexible authorization policies

Service providers and users can specify authorization policies around transactions involving their keys. Lock-Keeper allows service providers to integrate additional user authentication mechanisms (e.g., PINs and biometrics – face and/or fingerprint) to provide extra assurance for keys that protect high-value assets.

Person holding up a large key

User keys are safe and secure

With Lock-Keeper, service providers build on a fundamentally extensible framework for securing digital assets.

Our system enables service providers to offer users meaningful autonomy over their assets while preserving confidentiality.

How does it work?

Lock-Keeper is Modular and Extensible

Lock-Keeper is designed to be customizable without compromising our principles. It supports digital asset types beyond cryptocurrency. It enables complicated key control processes like joint key custody and user-centric, delegated key use.

Customizable and Balanced

You chose the right level of security for the asset. Depending on your service model or the level of asset protection needed, implement a variety of protection schemes seamlessly, including:

Shared Secrets

Whoever holds the key truly “owns” the asset. With Shared Secrets, keys are fragmented and distributed to allow for shared custody over the asset. Following established policies, all parties must agree to sign, which creates a collaborative and shared custody experience.

Learn about Shared Secrets

Multi-Party Computation

Private keys are split into key shares with entropy from multiple parties without any single party learning the whole private key at any time. There are no seed phrases or mnemonics for users to back up, and there is no single point of failure or compromise.

Learn about MPC

Changing how Web3 is secured

Ronen Kirsch

“We believe Bolt Labs will have a significant impact on our user experience and will provide a hospitable environment for new entrants to remain safe and have a pleasant experience on Forte.”

VP of Strategic Partnerships, Forte

Several people holding up a puzzle of a lightbulb. There is a piece missing.

Shared Secrets

For our Shared secret implementation, we use Shamir Secret Sharing (SSS), a fundamental cryptographic building block for sharing secrets

With Shared Secrets, a generated public/private key is split into shares across multiple parties, so the private key never exists as a whole when stored at rest. Secret shares are generated by a cnetralized and trusted dealer. But each secret share by itself does not reveal any information about the whole private key.

In order to generate a digital signature, the full private key must be reconstructed, which means multiple parties must engage in the transaction.

Shared Secret Pros
  • Distributed secure storage for shares increased security and privacy
  • Blockchain agnostic and supports any signature schemes (ECDSA, EdDSA, BLS, Schnorr, etc.)
  • Flexible signing, can support a subset of signers (for example, 3 out of 5 signers)
Shared Secret Considerations
  • When private keys are reconstructed, they present a point of compromise
  • Keys must be reconstructed for each use

Multi-Party Computation

Bolt offers a Theshold Signature Sceme (TSS), multiparty computation cryptographic protocol for distributed key generation and signing.

With MPC, the public and private key  pairs are generated and split into shards across multiple parties. The private key never exists as a whole at any time. Either at rest or in use. This The compute resources of a digital signature is distrubted across multiple parties where no individual party can see the other parties’ input or secret shares.

Signing is done without the need for reconstructing the secret shares. TSS protocols incorporate the use of zero-knowledge proofs to ensure the parties behave honestly in executing the distributed signature protocol.

MPC Pros
  • Distributed trust means no single point of failure or compromise since the keys do not exist as a whole at any time
  • Blockchain agnostic and can support any chain with ECDSA/EdDSA signatures support (which is most). Other threshold signature protocols exist for other signature types, like BLS and Schnorr.
  • Flexible signing can support a subset of signers (for example, 3 out of 5 signers)
  • Advanced features
    • Key refreshing (Private key shares can be rotated without affecting public key)
    • Zero-Knowledge Proofs provide security against malicious adversaries
MPC Considerations
  • Potential performance or scale concerned due to high shard number and signer threshold 
  • Computational overhead
  • High communication costs between parties
A lone worker at his deck. There are "shards" of data flying around him

Get started with Lock-Keeper

Speak with a Bolt Labs cryptography expert today to add Bolt’s digital asset security infrastructure to your projects and give your users the security and privacy they deserve.

Featured News

Announcing Bolt & Forte partnership

We’re excited to announce a $9 million strategic partnership with blockchain gaming company, Forte, a leading provider of blockchain solutions for game publishers, to support its adoption of cryptographic technologies, including multi-party computation (MPC) and zero-knowledge proofs.

read more

Introducing zkChannels on Tezos

Today, we’re proud to announce that we are working to bring the zkChannels protocol to the Tezos blockchain. zkChannels is a chain-agnostic anonymous off-chain protocol that enables cheap and private value transfer between a customer and merchant.

read more