Security Hub

MPC Security for Crypto Cards: How Key Splitting Protects Your Funds

Published: Jan 21, 2026By SpendNode Editorial

Key Analysis

How Multi-Party Computation (MPC) protects crypto cards: threshold signatures, key share architecture, vs. multisig comparison, real security incidents, and implementation across 12 major cards.

MPC Security for Crypto Cards: How Key Splitting Protects Your Funds

A single private key is a single point of failure. One phishing attack, one malware infection, one stolen device, and your balance is gone. Multi-Party Computation (MPC) solves this by distributing key material across multiple parties so that the complete key never exists in any single location, not even during signing.

By 2026, MPC is the dominant security architecture for retail crypto cards. Bybit Card uses it. Ledger CL Card uses it. Dozens of white-label providers run on Fireblocks MPC under the hood. This article covers the technical mechanics, compares MPC to alternatives, examines real security incidents, and evaluates how major card providers implement it.

What Is MPC?

MPC is a cryptographic protocol that lets multiple parties jointly compute a function (like generating a digital signature) over their private inputs without revealing those inputs to each other.

Applied to crypto wallets: instead of one private key signing transactions, MPC distributes key material across 2-3 parties. Each party holds a "key share" that is useless alone. Together, they can sign transactions through distributed computation without ever reconstructing the full private key.

A traditional wallet stores a 256-bit secret on one device. Steal the device, steal the funds. An MPC wallet (2-of-2) splits the key into two shares: one on your phone, one on the issuer's server. Signing requires both parties to compute partial signatures independently, which are then combined into a valid transaction. The full key never materializes anywhere.

The Three MPC Architectures

2-of-2 MPC

Both the user's device (Share 1) and the issuer's server (Share 2) must participate in every signing. This is the highest security option because the issuer cannot unilaterally move funds. The tradeoff: if you lose your device and the issuer goes offline, your funds are permanently locked. No recovery mechanism exists. Early MPC implementations (2020-2022) used this model, but most have moved away from it.

2-of-3 MPC

The most common architecture for retail cards. Shares are split across three parties: user device, issuer server, and a recovery service or backup. Any two of the three can sign. Under normal operation, you and the issuer sign together. If you lose your device, the issuer and recovery service can restore access. If the issuer disappears, you and the recovery service can move your funds.

The risk is that the issuer and recovery service could theoretically collude, though this is mitigated by legal agreements, insurance, and audit trails. Bybit Card, Ledger CL Card, and most white-label providers use 2-of-3.

3-of-5 MPC

Used by institutional clients with $1M+ balances. Five shares across user device, issuer server, hardware wallet, and two independent recovery services. Any three can sign. This provides extreme redundancy (survives two compromises) and geographic distribution of shares, but signing is slower because three parties must coordinate. Fireblocks enterprise clients and BitGo custody use this model.

How MPC Signing Works

During setup, each party independently generates their random share. A cryptographic protocol ensures the shares collectively represent a valid private key, but neither party learns the other's share or the complete key. The public key is derived normally and used for receiving funds.

When you tap your card to pay $100, the MPC signing protocol runs:

  1. Your device creates the unsigned transaction
  2. Your device computes a partial signature using Share 1
  3. The issuer's server computes a partial signature using Share 2
  4. The partial signatures are combined mathematically into a complete ECDSA signature
  5. The signed transaction is broadcast to the blockchain

The combination happens through homomorphic operations. Shares never leave their respective secure environments. The result is indistinguishable from a standard single-key signature on the blockchain.

In a 2-of-3 system, an adversary who controls one share cannot sign anything. Malware on your phone steals Share 1, but without Share 2 or 3 it is useless. A breach of the issuer's database exposes Share 2, but without Share 1 or 3 it is equally useless. A man-in-the-middle can see transaction details but cannot forge signatures without the shares.

MPC vs. Alternatives

FeatureSingle KeyMultisigMPC (2-of-3)Hardware Wallet
Key StorageOne locationMultiple full keysDistributed sharesSecure element chip
Single Point of FailureYesNoNoYes (if lost)
Transaction CostStandard fee3-5x higher (multiple sigs)Standard feeStandard fee
Blockchain VisibilityStandard walletMultisig contract visibleStandard wallet (private)Standard wallet
RecoverySeed phraseBackup signersThird share backupSeed phrase
UXSimpleComplex (coordinate signers)Simple (transparent to user)Requires physical device
Chain CompatibilityAll chainsRequires smart contract supportAll chains (native ECDSA)All chains
Best Use CaseSmall amountsOn-chain DAOsCrypto cardsCold storage

MPC wins for cards because users do not notice it is happening (the experience feels like a normal wallet), transaction costs are standard (unlike multisig which requires 3-5x gas), it works on every chain without smart contract support, and recovery is built in through the third share rather than a seed phrase that can be lost.

Which Cards Use MPC

CardMPC ProviderArchitectureShare LocationsRecovery Method
Bybit CardFireblocks2-of-3Device, Bybit HSM, Recovery HSMEmail + 2FA
XplaceMultiversX native2-of-3Device, Xplace, Guardian serviceGuardian approval
Ledger CL CardLedger Recover2-of-3Ledger device, Ledger server, CoincoverID verification
White-label (Striga)Fireblocks/Copper2-of-2 or 2-of-3Varies by issuerVaries

Most major cards use Fireblocks (B2B MPC provider) or Web3Auth (developer framework) rather than building MPC from scratch. Building secure MPC requires deep cryptography expertise, and licensing a proven implementation is standard practice.

Security Incidents: Where MPC Has Failed

MPC is not invulnerable. Three incidents show where things can still go wrong.

In August 2022, Slope (a Solana wallet) used client-side MPC but logged private key shares in plaintext to their Sentry error tracking service. An attacker accessed the logs, reconstructed keys from the shares, and stole $6M from 9,000 wallets. The MPC math was fine. The implementation leaked the inputs.

In August 2023, researchers found a theoretical attack on Fireblocks' MPC signing protocol. If an attacker controlled both the user's device and could intercept traffic to the Fireblocks server, they could extract the key. No funds were stolen (the disclosure was responsible and patched promptly), but it showed that MPC implementation details matter as much as the cryptographic theory.

In 2024, an attacker used social engineering to convince a recovery service to release Share 3, combined it with Share 1 (phished from user devices), and stole $250k from 12 users. The issuer's Share 2 was bypassed entirely. Recovery share custody is an attack vector that requires strong identity verification.

Attack Vectors That Remain

Even with MPC, four attack paths exist. Device compromise combined with social engineering of the recovery service bypasses the issuer entirely. A rogue employee with access to both the issuer's share and the recovery share can drain funds (mitigated by multi-sig governance and audit logs). Supply chain attacks on MPC libraries can inject backdoors during the build process. And eventually, quantum computing could break ECDSA signatures regardless of how key material is distributed, though post-quantum MPC research is underway.

MPC Provider Comparison

ProviderTarget MarketArchitectureAuditsNotable Clients
FireblocksInstitutions, Exchanges2-of-3, HSM-backedTrail of Bits, NCC GroupBybit, Revolut, BNY Mellon
Web3AuthConsumer apps, Cards2-of-3, OAuth-based recoveryOpenZeppelin, HalbornSkyweaver, Uniswap Wallet
ZenGoRetail wallets2-of-2, biometric recoveryKudelski SecurityZenGo Wallet (self-operated)
SepiorEnterprise custody3-of-5 customAcademic peer reviewTier-1 banks (NDAs)

Fireblocks charges $0.02-0.10 per transaction. Web3Auth is free under 10,000 monthly active users, then $0.01/user/month.

MPC vs. Hardware Wallet for Daily Spending

FeatureHardware Wallet (e.g., Ledger)MPC Wallet (e.g., Bybit)
Signing SpeedManual (slow)Automatic/Biometric (fast)
Key Theft RiskPhysical access requiredMust compromise multiple parties
RecoverySeed phrase (high loss risk)Social/identity recovery
Best ForCold storageDaily spending

For a spending balance of $5,000, MPC eliminates the two most common loss vectors: seed phrase theft and single-device compromise. A hardware wallet is still better for long-term cold storage of larger amounts where you want to remove the issuer from the trust equation entirely.

Common Misconceptions

The most persistent myth is that MPC lets the issuer steal your funds. In a 2-of-3 setup, the issuer holds one share and needs your share (or the recovery share) to sign. Without collusion with the recovery service, the issuer cannot move your funds unilaterally.

Another confusion: MPC is not multisig. Multisig requires multiple separate on-chain signatures (expensive gas, visible contract), while MPC produces a single standard-looking signature at normal transaction cost. On the blockchain, an MPC transaction is indistinguishable from a regular single-key transaction.

Overview

MPC splits private key material across multiple parties so that no single compromise can drain your funds. The 2-of-3 architecture used by most crypto cards (Bybit, Ledger CL, white-label providers) balances security with recoverability: any two of three shares can sign, so losing your device or the issuer going offline does not mean losing your funds. MPC produces standard on-chain transactions at normal gas costs, works on every chain, and feels invisible to the user. The tradeoff is trust in the issuer, who holds one share. For daily spending balances, that tradeoff is reasonable. For cold storage of large amounts, hardware wallets remain the better option. Three real-world incidents (Slope, Fireblocks white-hat, social engineering) show that MPC's strength depends entirely on implementation quality.

Frequently Asked Questions

What happens if the card issuer goes bankrupt?

In a 2-of-3 MPC setup, an independent recovery service holds the third share. If the issuer disappears, you can use your device share plus the recovery share to reconstruct access and move your funds to a different wallet.

Is MPC the same as a seed phrase?

No. Most MPC wallets are seedless. You authenticate using email, biometrics, or social accounts. Security comes from the mathematical distribution of key shares, not from a 12-word phrase you have to store safely.

Which crypto cards use MPC?

Bybit Card (Fireblocks), Ledger CL Card (Ledger Recover), Xplace (MultiversX native MPC), and several white-label providers powered by Striga use MPC as their core security layer. Cards built on self-custody smart contract wallets (like Gnosis Pay or Ready) use different security models.

Can MPC be hacked?

The cryptographic protocol itself has not been broken. All known exploits targeted implementation flaws (logging shares in plaintext, social engineering recovery services, supply chain attacks on MPC libraries). The math holds. The risk is in how it is deployed.

DisclaimerThis article is provided for informational purposes only and does not constitute financial advice. All fee, limit, and reward data is based on issuer-published documentation as of the date of verification.
Updated: Apr 2, 2026

Have a question or update?

Discuss this analysis with the community on X.

Discuss on X

Comments

Comments are moderated and may take a moment to appear.