Overview
Lit Protocol is a decentralized key management and private compute network. Lit provides developers building in Web3 with three core primitives:- Decentralized Signing and Wallet Management (support for ECDSA and EdDSA signatures) via MPC TSS + TEEs
- Decentralized Encryption / Decryption (identity-based BLS encryption scheme) via MPC TSS + TEEs
- Private Compute executed via Lit’s MPC TSS network and protected by sealed TEEs
The Problem
Lit Protocol is a decentralized key management network that solves the fundamental Web3 security dilemma: how to manage secrets without compromising security, user experience, or decentralization. The network empowers developers to create secure, decentralized applications that manage crypto assets, private data, and user authority seamlessly across any blockchain or distributed system. Traditional approaches force an impossible choice. Giving private keys or credentials to centralized servers creates massive security responsibilities and single points of failure. Putting the burden entirely on end users requires them to navigate complex key management and opens up avenues for compromise. Lit Protocol eliminates this tradeoff. Lit’s distributed architecture ensures secrets remain verifiably secure - encrypted at the hardware level and fragmented across a decentralized network with no single point of failure. Using threshold signature schemes (MPC TSS) as a foundation means that for the first time, universal accounts can be programmed and automated without trusting centralized custodians. This underlying security architecture enables powerful developer capabilities. Using Lit’s SDK, builders can easily:- Encrypt and decrypt private data
- Create and manage Web3 wallets, accounts, and signers
- Sign transactions and messages on virtually any blockchain
- Execute automated signing and/or decryption operations based on programmable conditions
- Read and write to any off-chain endpoint to ensure compatibility with legacy systems and the rest of the web2 world
Use Cases and Live Implementations
Lit Protocol’s versatile architecture supports a wide range of applications across various categories:Web3 Wallets and User Onboarding
Developers can use Lit to generate and manage non-custodial keys using a variety of flexible authentication flows (ex. oAuth and Passkeys) with support for programmable transaction automation. This functionality enables seamless onboarding experiences that don’t sacrifice UX while keeping users in control. Examples include Collab.Land, Plurality Network, and Genius Protocol who are using Lit to create user-friendly wallet experiences and account abstraction solutions.Digital Identity
Lit allows for flexible encryption and access management based on blockchain state, token ownership, or other on/off-chain conditions. This can be used for digital identity and IP rights management, verifiable data marketplaces, DWeb storage solutions, and more. Streamr, Bonny, Cheqd, Beacon Protocol, Lens Protocol, Irys, Verify (Fox Corp), and Alexandria Labs are examples of protocols using Lit for secure data management and distribution.Chain Abstraction and DeFi
Developers can utilize Lit’s programmable and chain-agnostic signing capabilities to facilitate cross-chain interoperability and generalized message passing to create a more unified and capital efficient Web3 ecosystem. Live implementations include Genius Protocol, Tria, Emblem Vault, Eco, Polaris, VaultLayer, and GVNR.Data Oracles and Real-World Integration
Lit enables the creation of data oracles that securely fetch off-chain data for use in on-chain applications, bridging the gap between smart contracts and real-world information.📝 Data Oracle Kit The Lit Oracle Kit demonstrates how the Lit Network can be used to sign data pulled from the web (or another blockchain) and write it to chain. Note: This kit is currently built for V7 of the Lit SDK. A V8 version is coming soon!