#Gate 2025 Semi-Year Community Gala# voting is in progress! 🔥
Gate Square TOP 40 Creator Leaderboard is out
🙌 Vote to support your favorite creators: www.gate.com/activities/community-vote
Earn Votes by completing daily [Square] tasks. 30 delivered Votes = 1 lucky draw chance!
🎁 Win prizes like iPhone 16 Pro Max, Golden Bull Sculpture, Futures Voucher, and hot tokens.
The more you support, the higher your chances!
Vote to support creators now and win big!
https://www.gate.com/announcements/article/45974
Ed25519-powered MPC: Helping DApps and Wallets Achieve a New Height of Security
The Application of Ed25519 in MPC: Enhancing Security for DApps and Wallets
In recent years, Ed25519 has become an important component of the Web3 ecosystem. Although popular blockchains such as Solana, Near, and Aptos have widely adopted Ed25519, true MPC solutions have not yet been fully applied to them. This means that even as cryptographic technology continues to advance, Ed25519 Wallets often still lack the level of multi-party security to eliminate the risks posed by a single private key. Without MPC technology, these wallets will continue to face the same core security vulnerabilities as traditional wallets, leaving room for improvement in the protection of digital assets.
Recently, a mobile-friendly trading suite called Ape Pro has emerged in the Solana ecosystem. This product combines powerful trading features, a mobile-friendly design, social login, and a token creation experience.
The Current Status of Ed25519 Wallets
It is very important to understand the weaknesses of the current Ed25519 Wallet system. Typically, wallets use mnemonic phrases to create private keys, which are then used to sign transactions. However, traditional wallets are more susceptible to attacks such as social engineering, phishing websites, and malware. Since the private key is the only way to access the wallet, once an issue arises, recovery or protection becomes very difficult.
This is exactly where MPC technology comes into play. Unlike traditional Wallets, MPC Wallets do not store private keys in a single location. Instead, the keys are divided into multiple parts and distributed across different locations. When a transaction needs to be signed, these key parts generate partial signatures, which are then combined using a threshold signature scheme (TSS) to produce the final signature.
Since the private key is never fully exposed on the front end, the MPC Wallet can provide excellent protection, effectively defending against social engineering, malware, and injection attacks, thereby elevating the wallet's security to a whole new level.
Ed25519 Curve and EdDSA
Ed25519 is a twisted Edwards form of Curve25519, optimized for double-scalar multiplication. This is a key operation in EdDSA signature verification. Compared to other elliptic curves, Ed25519 is more popular because it has shorter key and signature lengths, faster and more efficient signature computation and verification, while still maintaining a high level of security. Ed25519 uses a 32-byte seed and a 32-byte public key, with a signature size of 64 bytes.
In Ed25519, the seed is hashed using the SHA-512 algorithm, from which the first 32 bytes are extracted to create the private scalar. This scalar is then multiplied by the fixed elliptic point G on the Ed25519 curve to generate the public key.
This relationship can be expressed as: Public Key = G x k
Here k represents the private scalar, and G is the base point of the Ed25519 curve.
How to Support Ed25519 in MPC
Some MPC solutions adopt different approaches. Instead of generating a seed and hashing it to obtain a private scalar, they directly generate the private scalar, then use that scalar to compute the corresponding public key, and use the FROST algorithm to generate threshold signatures.
The FROST algorithm allows private keys to share independently signed transactions and generate final signatures. Each participant in the signing process generates a random number and makes a commitment to it, which is then shared among all participants. After sharing the commitments, participants can independently sign the transaction and generate the final TSS signature.
This method utilizes the FROST algorithm to generate valid threshold signatures while minimizing the required communication compared to traditional multi-round schemes. It also supports flexible thresholds and allows for non-interactive signing among participants. After the commitment phase is completed, participants can independently generate signatures without further interaction. In terms of security level, it can prevent forgery attacks without restricting the concurrency of signing operations, and abort the process in case of improper behavior from participants.
Using Ed25519 Curve in DApp and Wallet
Support for Ed25519 represents a significant advancement for developers building DApps and Wallets using the Ed25519 curve. This new feature provides new opportunities to build DApps and Wallets with MPC capabilities on popular chains such as Solana, Algorand, Near, and Polkadot.
Ed25519 now also receives native support from some MPC solutions. This means that non-MPC SDKs based on Shamir Secret Sharing can directly use Ed25519 private keys in various solutions, including mobile, gaming, and Web SDKs. Developers can explore how to integrate these technologies with blockchain platforms such as Solana, Near, and Aptos.
Conclusion
In summary, MPC solutions that support EdDSA signatures provide enhanced security for DApps and Wallets. By leveraging true MPC technology, it eliminates the need to expose private keys on the frontend, significantly reducing the risk of attacks. In addition to strong security, it offers seamless, user-friendly login and more efficient account recovery options. These advancements will drive the Web3 ecosystem towards a more secure and user-friendly direction.