Skip to main content

MPC Security – Eliminating Single Points of Failure

Bron uses MPC to eliminate private keys and seed phrases — removing the single points of failure found in other wallets.

Updated over 2 months ago

Most wallets rely on a single private key to control your assets. This creates a major risk: anyone who gets access to that key can take your funds.

Bron uses MPC (Multi-Party Computation) to keep your wallet secure — without a private key. Instead, it generates three separate pieces, called shards, stored in different places. No one person or device ever has full access to all three shards simultaneously. This means even if one shard is compromised, your wallet remains secure.

1. How it works

Bron’s MPC implementation enables keyless wallet creation with institutional-grade security.

  • When a wallet is created, a public address and three shards are generated.

  • No private key is ever created or stored.

  • Two out of three shards are required to authorize a blockchain transaction.

  • To compromise a wallet, two shards must be compromised at the same time.

  • Every account in your Bron workspace uses a unique set of shards.

2. Shard Distribution

  • Shard 1 — Held by you.

  • Shard 2 — Managed by Bron.

  • Shard 3 — Held by a Trusted Third Party, contracted on your behalf.

All shards are encrypted. This ensures that even if a shard is misplaced, it cannot be used or read without proper authorisation.

3. Trusted Third Parties

Why are Trusted Third Parties needed?

Trusted Third Parties (TTPs) are an essential part of Bron’s security and recovery model. They ensure that you can regain access to your wallet — even if Bron becomes unavailable.

If that happens, you can contact the TTP directly. After verifying your identity, the TTP can help reconstruct your shard using its shard and Bron’s shard. This ensures you stay in control of your assets, even under extreme circumstances.

TTPs are independent companies that specialize in secure cryptographic storage. They are:

  • Selected for expertise in secure data infrastructure.

  • Independent — not part of Bron’s daily operations.

  • Non-intrusive — they cannot access your funds or sign transactions unless explicitly authorized in recovery scenarios.

From the moment your wallet is created, the third shard is securely held by the TTP.

4. How the Shards Work in Practice

Daily Operations

  • Your shard (1) + Bron’s shard (2) are used for normal transaction signing.

  • When you initiate a transaction, your shard signs first.

  • Bron then signs automatically — it never initiates transactions or exercises discretion. It simply executes your instruction.

Disaster Recovery

  • If access to either your shard or Bron’s shard is lost, the TTP’s shard (3) is used to help restore access.

  • In a recovery event, either you or Bron (depending on the case) initiates the process. Once your identity is verified, the TTP collaborates with the remaining party to reconstruct the missing shard.

This setup ensures that your assets remain secure, recoverable, and in your control — even if one party is compromised or goes offline.

If you have questions, contact our support team via messenger on the Bron platform or by email support@bron.org.

Did this answer your question?