Secure coordination with no exposure
Client
Bolt Labs
Timeline
2024
Outcomes
Threshold Signature Scalability
Tech
MPC, Threshold Cryptography
_
Introduction
In the analog world, trust can be personal. In the digital world, it must be provable.
Building systems that collaborate securely without exposure is no longer a luxury — it's a necessity.

In a world where trust is increasingly distributed, Bolt Labs is working to ensure that collaboration remains private, resilient, and verifiable by design.

Bolt Labs engaged Inversed to test the limits of decentralized trust: pushing cryptographic systems toward greater scalability, privacy, and fault tolerance.

_
The challenge

Trust is the bedrock of all systems. However, building trust into decentralized systems is a unique challenge. As networks decentralize, the ability to coordinate without trusted intermediaries becomes critical. Bolt Labs saw that existing cryptographic solutions often force trade-offs between scalability, security, and simplicity. Trade-offs that effectively limit real-world adoption.

Bolt Labs wanted to determine if threshold cryptography could unlock scalable, resilient coordination, without relying on traditional trust models or centralized fallback systems. No shortcuts. No weak links.

_
Why it matters
Security shouldn’t depend on certainty.
Building systems that can coordinate without central points of failure is essential for the future of decentralized networks.
Resilience should be the default.
Cryptography isn’t abstract. It’s the architecture of trust. At Inversed, we view strong, decentralized systems as building blocks of freedom.
_
Our approach

Inversed partnered with Bolt Labs to design and validate a cryptographic framework for decentralized coordination. The challenge was to ensure that multiple parties could jointly authorize actions without relying on a single point of trust. Especially when coordination among multiple parties is required.

We architected a threshold signature solution: enabling secure group decision-making without exposing private keys or centralizing authority. Building cryptographic trust directly into the system itself.

_
implementation
Architecting secure layers of collaboration.

To create a secure threshold signature system, we integrated cryptographic protocols that distribute trust without exposing private inputs. Executing Bolt’s vision required privacy, reliability, and resilience be engineered at the protocol level. A foundation that could enable verifiable, decentralized actions without centralized points of failure.

A side-by-side comparison of two circular diagrams illustrating Traditional vs. Threshold Signing Systems. The left circle (Traditional) shows a centralized structure with a single red point connected to all others, highlighting risks like centralized key shares and single points of failure. The right circle (Threshold) depicts a decentralized model with evenly distributed nodes and multiple red points, representing collaborative signing, decentralized key shares, and improved trust tolerance. Below, a six-step list outlines the development process, from defining trust assumptions to delivering implementation insights. The visual emphasizes secure, distributed cryptographic coordination without central authority.A side-by-side comparison of two circular diagrams illustrating Traditional vs. Threshold Signing Systems. The left circle (Traditional) shows a centralized structure with a single red point connected to all others, highlighting risks like centralized key shares and single points of failure. The right circle (Threshold) depicts a decentralized model with evenly distributed nodes and multiple red points, representing collaborative signing, decentralized key shares, and improved trust tolerance. Below, a six-step list outlines the development process, from defining trust assumptions to delivering implementation insights. The visual emphasizes secure, distributed cryptographic coordination without central authority.
To get there, we had to:
  1. Define trust and failure assumptions for threshold signing.
  2. Explore optimal schemes for distributed key management.
  3. Design secure signing protocols resistant to leaks and failures.
  4. Analyze scalability and resilience at increasing participant counts.
  5. Outline next steps and technical recommendations for global roll-out.
  6. Deliver implementation insights and future-proofing recommendations.
_
Results & impact

This collaboration with Bolt validated the potential for threshold cryptography to support non-custodial systems at scale. By demonstrating how control can be securely distributed across multiple parties, it lays the groundwork for trust-minimized infrastructure in a multi-asset world.

_
Implications

The project reinforced Bolt’s belief in building secure, decentralized systems without trade-offs. For Inversed, it was a natural extension of our work — applying cryptography to design systems that embed trust into the protocol itself, not the necessarily the people operating it.

Custody in digital systems can now scale with certainty. Keeping power in the hands of users. In a literal sense, changing who holds the keys.

_
Testimonials

We partnered with Inversed to explore a technically challenging corner of cryptography. We came away with a robust design that can be built and tested against, with a real confidence in its scalability and security under pressure.

Foundry McFarley
Co-Founder, Bolt Labs
_
Next case