{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T08:39:57Z","timestamp":1769762397552,"version":"3.49.0"},"reference-count":51,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T00:00:00Z","timestamp":1735603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Blockchain wallets are essential interfaces for managing digital assets and authorising transactions within blockchain systems. However, typical blockchain wallets often encounter performance, privacy and cost issues when utilising multi-signature schemes and face security vulnerabilities with single-signature methods. Additionally, while granting users complete control, non-custodial wallets introduce technical complexities and security risks. While custodial wallets can mitigate some of these challenges, they are primary targets for attacks due to the pooling of customer funds. To address these limitations, we propose a chain-agnostic Multi-Party Computation Threshold Signature Scheme (MPC-TSS) shared-custodial wallet with securely distributed key management and recovery. We apply this solution to create a wallet design for wealth managers and their clients, consolidating the management and access of multiple cryptocurrency tokens and services into a single application interface.<\/jats:p>","DOI":"10.3390\/fi17010007","type":"journal-article","created":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T13:37:51Z","timestamp":1735738671000},"page":"7","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Shared-Custodial Wallet for Multi-Party Crypto-Asset Management"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9151-9114","authenticated-orcid":false,"given":"Yimika","family":"Erinle","sequence":"first","affiliation":[{"name":"Centre for Blockchain Technologies, University College London, London WCIE 6BT, UK"},{"name":"DLT Science Foundation, London WC2H 2JQ, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7235-2377","authenticated-orcid":false,"given":"Yebo","family":"Feng","sequence":"additional","affiliation":[{"name":"College of Computing & Data Science, Nanyang Technological University, Singapore 639798, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3993-5263","authenticated-orcid":false,"given":"Jiahua","family":"Xu","sequence":"additional","affiliation":[{"name":"Centre for Blockchain Technologies, University College London, London WCIE 6BT, UK"},{"name":"DLT Science Foundation, London WC2H 2JQ, UK"}]},{"given":"Nikhil","family":"Vadgama","sequence":"additional","affiliation":[{"name":"Centre for Blockchain Technologies, University College London, London WCIE 6BT, UK"},{"name":"DLT Science Foundation, London WC2H 2JQ, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5460-5940","authenticated-orcid":false,"given":"Paolo","family":"Tasca","sequence":"additional","affiliation":[{"name":"Centre for Blockchain Technologies, University College London, London WCIE 6BT, UK"},{"name":"DLT Science Foundation, London WC2H 2JQ, UK"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Baur, A.W., B\u00fchler, J., Bick, M., and Bonorden, C.S. (2015, January 13). Cryptocurrencies as a disruption? Empirical findings on user adoption and future potential of bitcoin and co. Proceedings of the Conference on e-Business, e-Services and e-Society, Delft, The Netherlands.","DOI":"10.1007\/978-3-319-25013-7_6"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1108\/SCM-03-2018-0143","article-title":"Blockchain and supply chain management integration: A systematic review of the literature","volume":"25","author":"Queiroz","year":"2020","journal-title":"Supply Chain. Manag. Int. J."},{"key":"ref_3","unstructured":"Linn, L.A., and Koo, M.B. (2016, January 26\u201327). Blockchain for health data and its potential use in health IT and health care related research. Proceedings of the ONC\/NIST Use of Blockchain for Healthcare and Research Workshop, Gaithersburg, MD, USA. ONC\/NIST."},{"key":"ref_4","first-page":"256","article-title":"Banking with blockchain-ed big data","volume":"5","author":"Hassani","year":"2018","journal-title":"J. Manag. Anal."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Alzahrani, S., and Daim, T.U. (2019, January 25\u201329). Analysis of the cryptocurrency adoption decision: Literature review. Proceedings of the 2019 Portland International Conference on Management of Engineering and Technology (PICMET), Portland, OR, USA.","DOI":"10.23919\/PICMET.2019.8893819"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Yao, A.C. (1982, January 3\u20135). Protocols for secure computations. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982), Chicago, IL, USA.","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C. (1986, January 27\u201329). How to generate and exchange secrets. Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS 1986), Toronto, ON, Canada.","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref_8","unstructured":"Erinle, Y., Kethepalli, Y., Feng, Y., and Xu, J. (2023). SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets. arXiv."},{"key":"ref_9","unstructured":"Thompson, S. (2017). The preservation of digital signatures on the blockchain. See Also, 3."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Blakley, G.R. (1979, January 4\u20137). Safeguarding cryptographic keys. Proceedings of the 1979 International Workshop on Managing Requirements Knowledge (MARK), New York, NY, USA.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1002\/ett.4460050407","article-title":"Threshold cryptography","volume":"5","author":"Desmedt","year":"1994","journal-title":"Eur. Trans. Telecommun."},{"key":"ref_13","unstructured":"Desmedt, Y. (1997, January 17\u201319). Some recent research aspects of threshold cryptography. Proceedings of the Information Security: First International Workshop, ISW\u201997 Tatsunokuchi, Ishikawa, Japan. Proceedings 1."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lindell, Y., and Nof, A. (2018, January 15\u201319). Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada.","DOI":"10.1145\/3243734.3243788"},{"key":"ref_15","first-page":"377","article-title":"Distributed Key Generation in the Wild","volume":"2012","author":"Kate","year":"2012","journal-title":"Cryptology ePrint Archive"},{"key":"ref_16","unstructured":"Pedersen, T.P. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. Proceedings of the Annual International Cryptology Conference."},{"key":"ref_17","unstructured":"(2024, July 26). DeRec. Available online: https:\/\/github.com\/derecalliance\/protocol\/blob\/main\/protocol.md."},{"key":"ref_18","unstructured":"Zengo (2024, July 02). What is Zengo\u2019s Recovery Kit?. Available online: https:\/\/help.zengo.com\/en\/articles\/2603673-what-is-zengo-s-recovery-kit."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Thyagarajan, S.A.K., Bhat, A., Malavolta, G., D\u00f6ttling, N., Kate, A., and Schr\u00f6der, D. (2020, January 9\u201313). Verifiable Timed Signatures Made Practical. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual.","DOI":"10.1145\/3372297.3417263"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Abadi, A., and Kiayias, A. (2021, January 1\u20135). Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications. Proceedings of the Financial Cryptography, Virtual.","DOI":"10.1007\/978-3-662-64331-0_28"},{"key":"ref_21","unstructured":"Rivest, R.L., Shamir, A., and Wagner, D. (1996). Time-Lock Puzzles and Timed-Release Crypto, Massachusetts Institute of Technology."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Malavolta, G., and Thyagarajan, S.A.K. (2019, January 18). Homomorphic Time-Lock Puzzles and Applications. Proceedings of the IACR Cryptology ePrint Archive, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-030-26948-7_22"},{"key":"ref_23","unstructured":"Kavousi, A., Abadi, A., and Jovanovic, P. (2024, February 03). Timed Secret Sharing. Cryptology ePrint Archive. Available online: https:\/\/eprint.iacr.org\/2023\/1024."},{"key":"ref_24","unstructured":"Financial Conduct Authority (2024, December 06). Client Agreements (MiFID, Equivalent Third Country or Optional Exemption Business). FCA Handbook: Conduct of Business Sourcebook (COBS), COBS 8A.1., Available online: https:\/\/www.handbook.fca.org.uk\/handbook\/COBS\/8A\/1.html."},{"key":"ref_25","unstructured":"Metamask (2024, December 01). Does MetaMask Charge a Fee for Validator Staking?. Available online: https:\/\/support.metamask.io\/metamask-portfolio\/move-crypto\/stake\/validator-staking\/other\/validator-staking-fee\/."},{"key":"ref_26","unstructured":"(2024, October 23). zkPass. Available online: https:\/\/zkpass.gitbook.io\/zkpass\/overview\/use-cases\/zkkyc."},{"key":"ref_27","unstructured":"Chain Analysis Team (2024, September 14). How Continuous Cryptocurrency Transaction Monitoring Gives Compliance Teams Peace of Mind. Available online: https:\/\/www.chainalysis.com\/blog\/kyt-continuous-monitoring\/."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.icte.2021.08.004","article-title":"Blockchain side implementation of pure wallet (pw): An offline transaction architecture","volume":"7","author":"Igboanusi","year":"2021","journal-title":"ICT Express"},{"key":"ref_29","unstructured":"Ebrahimi, S., Hasanizadeh, P., Aghamirmohammadali, S.M., and Akbari, A. (2021). Enhancing Cold Wallet Security with Native Multi-Signature Schemes in Centralized Exchanges. arXiv."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Han, J., Song, M., Eom, H., and Son, Y. (2021, January 22\u201326). An efficient multi-signature wallet in blockchain using bloom filter. Proceedings of the 36th Annual ACM Symposium on Applied Computing, Virtual.","DOI":"10.1145\/3412841.3441910"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Di Nicola, V., Longo, R., Mazzone, F., and Russo, G. (2020). Resilient Custody of Crypto-Assets, and Threshold Multisignatures. Mathematics, 8.","DOI":"10.3390\/math8101773"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/s00145-021-09409-9","article-title":"Fast Secure Two-Party ECDSA Signing","volume":"34","author":"Lindell","year":"2021","journal-title":"J. Cryptol."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Doerner, J., Kondi, Y., Lee, E., and Shelat, A. (2019, January 19\u201323). Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00024"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Blokh, C., Makriyannis, N., and Peled, U. (2023, May 01). Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage. Cryptology ePrint Archive, Paper 2022\/1296, 2022. Available online: https:\/\/eprint.iacr.org\/2022\/1296.","DOI":"10.1149\/MA2022-02361296mtgabs"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Mavrovouniotis, S., and Ganley, M. (2013). Hardware security modules. Secure Smart Embedded Devices, Platforms and Applications, Springer.","DOI":"10.1007\/978-1-4614-7915-4_17"},{"key":"ref_36","unstructured":"(2023, April 14). Copper. Available online: https:\/\/copper.co\/products\/digital-asset-custody."},{"key":"ref_37","unstructured":"(2023, January 05). Gemini Custody. Available online: https:\/\/www.gemini.com\/custody."},{"key":"ref_38","unstructured":"(2023, February 06). Fireblocks. Available online: https:\/\/www.fireblocks.com\/."},{"key":"ref_39","unstructured":"(2023, February 05). BitGo. Available online: https:\/\/www.bitgo.com\/products\/custodial-wallets\/."},{"key":"ref_40","unstructured":"(2022, July 18). Genesis. Available online: https:\/\/genesistrading.com."},{"key":"ref_41","unstructured":"(2024, August 02). Ripple Custody. Available online: https:\/\/ripple.com\/solutions\/digital-asset-custody\/."},{"key":"ref_42","unstructured":"(2023, January 18). Tangany. Available online: https:\/\/tangany.com\/."},{"key":"ref_43","unstructured":"(2023, January 10). Prosegur Crypto. Available online: https:\/\/www.prosegurcrypto.com\/en."},{"key":"ref_44","unstructured":"(2023, March 02). DLT Finance. Available online: https:\/\/dlt-finance.com\/."},{"key":"ref_45","unstructured":"(2023, February 25). Hex Trust. Available online: https:\/\/hextrust.com\/services\/hex-trust-custody."},{"key":"ref_46","unstructured":"(2023, January 18). BitPanda. Available online: https:\/\/custody.bitpanda.com\/."},{"key":"ref_47","unstructured":"(2023, January 04). GK8. Available online: https:\/\/www.gk8.io\/solutions\/."},{"key":"ref_48","unstructured":"(2022, September 04). DigiVault. Available online: https:\/\/cointelegraph.com\/news\/digivault-launches-permanently-live-cryptocurrency-custody."},{"key":"ref_49","unstructured":"(2024, August 04). Cybavo by Circle Company. Available online: https:\/\/www.cybavo.com."},{"key":"ref_50","unstructured":"(2023, February 10). Bitcoin Suisse. Available online: https:\/\/www.bitcoinsuisse.com\/vault."},{"key":"ref_51","unstructured":"(2023, January 04). Cobo. Available online: https:\/\/www.cobo.com."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/1\/7\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:57:57Z","timestamp":1760115477000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/1\/7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,31]]},"references-count":51,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["fi17010007"],"URL":"https:\/\/doi.org\/10.3390\/fi17010007","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,31]]}}}