End-to-end encrypted relay service designed for MPC/TSS applications built using the noise protocol and websockets for the transport layer.
The service facilitates secure communication between peers but it does not handle public key exchange nor meeting points.
For clients to use the relay service they must know the public key of the server and the public keys of all the participants for a session.
Creating a meeting point that shares the session identifier between participants to execute an MPC/TSS protocol is left up to the application. Typically, this can be achieved by encoding the session identifier in a URL and sharing the URL with all the participants.
cggmp
: Enable the CGGMP21 protocol using synedrion.
ecdsa
: Single-party signer compatible with Ethereum using k256.eddsa
: Single-party signer compatible with Solana using ed25519 and ed25519-dalek.schnorr
: Single-party signer compatible with Bitcoin Taproot (BIP-340) using k256.
- CGGMP
- ECDSA
- EdDSA
- FROST
- Schnorr
- CGGMP
- ECDSA
- EdDSA
- FROST
- Schnorr
cargo install mpc-relay
- protocol Message types and encoding
- server Websocket server library
- client Websocket client library
- cli Command line interface for the server
The client implementation uses web-sys for webassembly and tokio-tungstenite for other platforms.
You will need the rust toolchain and a few other tools:
cargo install cargo-make
cargo install cargo-nextest
cargo install wasm-pack
Minimum supported rust version (MSRV) is 1.68.1.
Run the gen-keys
task to setup keypairs for the server and test specs:
cargo make gen-keys
Start a server:
cargo run -- start config.toml
cargo make doc
To run the integration tests using the native client:
cargo nextest run
For webassembly and node binding tests see the README files in the conformance directory.
The bindings and driver crates are released under the GPLv3 license and all other code is either MIT or Apache-2.0.