Boltzmann x Tangle:
Empowering Users with Secure, Decentralized AI.
Build on Tangle

Kickstart Multi-Party Computation Innovation

Join our developer community to scale privacy and distributed trust to secure blockchain solutions.
Header image
Develop with tangle

Explore cutting-edge applications with threshold-signature schemes

Custody Solutions

For wallet infrastructure and custody solutions managing digital assets, threshold signatures enhance security by distributing the signing authority across multiple parties. No single entity has control over the entire private key, reducing the risk of unauthorized access. In the event that one key share is compromised, the assets remain secure as the attacker would need to obtain multiple key shares to perform a transaction.

Learn more
Arrow - Elements Webflow Library - BRIX Templates


Threshold signatures contribute to the security of oracles by requiring a subset of oracle nodes to agree on the data before it is accepted and used by smart contracts. This reduces the risk of a single point of failure and makes it more difficult for attackers to compromise the integrity of the data

Learn more
Arrow - Elements Webflow Library - BRIX Templates

Cross-Chain Bridges

By distributing the signing authority across multiple nodes in the bridge network, threshold signatures ensure that no single node can unilaterally approve transactions. This reduces the risk of single points of failure and increases the security of cross-chain transfers, whilst also enhances privacy and security, as sensitive data is not exposed.

Learn more
Arrow - Elements Webflow Library - BRIX Templates
why tangle

Reimagine Blockchain with MPC Solutions

Tangle is tailored for developers working on advanced Zero-Knowledge (ZK) and cross-chain solutions. Central to that is the fusion of cross-chain interoperability, Ethereum Virtual Machine (EVM) compatibility, sophisticated governance protocols, and ZK services.
Threshold Signature as Service (TSSaaS)
Signatures are pervasive in the design of blockchain bridges, oracles, and custody solutions. Tangle provides signatures as a service using threshold cryptography as a first class citizen ofthe protocol.
Learn More
Proof Generation as Service (ZKSaaS)
Proof generation is critical for maintaining privacy and implementation of complex cryptographic protocols within decentralized applications. Tangle's zkSnark service allows users to access proof generation functionality directly through the network's infrastructure.
View GitHub

Benefits of MPC

Multi-party computation provides an array of benefits for individuals, developers, organizations, and research groups:
Distributed model
Remove single point failure
Compliance with data sharing restrictions
Protection from malicious party and attack
Enhanced trust and security
protocol extensions

Start developing cutting-edge applications for advanced privacy

Integration icon

Add New Threshold Signature Schemes

Threshold signature schemes like ECDSA, Schnorr, BLS, and FROST can be added to MPC systems to enhance security by distributing signature generation across multiple parties, reducing key compromise risk.
Integration icon

Integrate Fully Homomorphic Encryption Solutions

Fully Homomorphic Encryption (FHE) allows computations on encrypted data without decryption. Integrating FHE with MPC can enable secure and private computation on encrypted data across multiple parties, combining the benefits of both techniques.
Integration icon

Add Randomness Beacons

Randomness beacons, like those from the League of Entropy, provide verifiable random values essential for various cryptographic protocols. Integration into MPC systems can enhance security and fairness in operations like leader election, lotteries, and other protocols that require unbiased randomness.
Integration icon

Integrate Federated Learning Protocols

Securely compute AI and ML models on distributed data without exposing the underlying data, unlocking privacy-preserving data analysis and model training. An example is federated learning (FL), where multiple parties collaboratively train a ML model while keeping their individual datasets private.
Integration icon

Integrate Threshold Encryption Protocols

Threshold encryption protocols enable the encryption and decryption of data to be distributed among multiple parties. This can enhance data security by ensuring that no single party has access to the decryption key, thus requiring a quorum for decryption.
Integration icon

Develop General MPC Compiler Infrastructure

Developing a general MPC compiler infrastructure can simplify the process of converting standard programs into MPC-compatible versions, making it easier for developers to create secure multi-party applications.

Get started

Explore our open-sourced repositotries

Join our community of builders in enhancing privacy-centric cloud solutions through the power of Multi-Party Computation.


The main repository of Tangle Network, an MPC-as-a-service restaking infrastructure powering cross-chain and zero-knowledge application development. Built on Substrate, Tangle Network empowers privacy-enhancing and governance-decentralized applications, incorporating cross-chain functionality, EVM compatibility, advanced governance systems, and ZK applications into a unified ecosystem.
View GitHub


A common platform for MPC gadgets. These gadgets are peers on a network that query a blockchain for job information and then perform work based on these on-chain jobs cooperatively with other gadgets. Jobs include threshold signatures, zero-knowledge proofs, and more, each with a corresponding protocol that the gadgets use to perform the work.
View GitHub


Rust implementation of the zkSaaS protocol based on zkSaaS: Zero-Knowledge SNARKs as a Service. This is a protocol (and more generally a service) that leverages secure multi-party computation to generate zkSNARKs. It does so by distributing the core computations used in the zero-knowledge prover of the target protocols.
View GitHub