COTI’s privacy-focused development of Ethereum L2 reached a crucial milestone with the successful integration of the Multi-Party Computation (MPC) protocol. The token price rose by about 55% after this technical performance.
MPC is a powerful cryptographic tool that allows different parties to collaborate on a computation using their private data, without revealing that data to each other. COTI confirms that the successful implementation of the MPC protocol is the first in a series of technical goals that they will meet before full deployment of COTI V2.
COTI V2 architecture and MPC integration.
The COTI V2 architecture is based on MPC technology and ensures the privacy of the Layer 2 computations on Ethereum through private inputs that are performed without compromising the confidentiality of the data. Participants provide coded data to an MPC ‘black box’, which carries out specific calculation processes. MPC results are delivered in a way that ensures data integrity everywhere, even amid potential external oversight. Each MPC entity, also called an “MPC endpoint,” will later be integrated into the project’s custom Extended-EVM execution module.
MPC endpoints facilitate collaborative computation without sacrificing data privacy. This advancement significantly improves EVM functionality, unlocking support for more diverse dApps within a framework that provides transparency alongside essential privacy capabilities. This integrated MPC architecture provides greater privacy and security for complex on-chain computations, potentially driving broader adoption of Ethereum technology as use cases expand.
To facilitate the use of MPCs, users first establish cryptographic key material. The data is then sent in encrypted form for secure storage. Users then submit workloads in secure MPC bytecode, where operations such as addition and multiplication occur on confidential data without exposing the original values. Workloads can generate public output or output that is specifically coded to remain accessible only to chosen users.
Testing and future plan.
According to COTI, this was a simulated situation tested within MPC modules while collectively generating a “distorted circuit.” This cryptographic concept represents a specific computing function and has inherent security because it is inherently single-use. This provides forward and backward secrecy by design.
This first development milestone includes completing the protocol, including design and algorithms. Importantly, COTI developers have demonstrated the ability to securely input and output data using distributed keys, enabling advanced encryption and decryption features without compromise.
Reaching this privacy-focused milestone highlights progress toward COTI’s ambitious Layer 2 solution. A COTI blog post states:
“The creation and implementation of a secure MPC protocol is the first of many development milestones we will achieve throughout the year. Stay tuned for further COTI V2 updates as development continues.”