Ready to build with us?
Read the docs and join the community on Discord.
The zero trust interoperability platform that allows protocols to operate across all chains while preserving users' self custody - so no user assets are at risk.
Zero Trust Protocols, or ZTPs, are a new type of Web3 protocol. A ZTP operates across multiple networks without requiring the user to trust third parties, like cross-chain solutions do. At the core of ZTP architecture is the dWallet, empowering developers to build ZTPs where user participation is cryptographically verified.
As Web3 evolved, networks with their own "zones of sovereignty" emerged, allowing protocols to inherit their Zero Trust architecture.
Traditional solutions operating across networks rely on third parties, turning Zero Trust Protocols (ZTPs) into Castle-and-Moat Protocols (CMPs).
dWallets empower builders on L1s/L2s to develop ZTPs operating across networks.
Pera introduces Zero Trust Protocols (ZTPs), a revolutionary solution to both the Sovereignty Problem and the Honeypot Problem. dWallets, our innovative cryptographic primitive, can be used by ZTPs to enforce logic on user-generated signatures for transactions on any network.
A dWallet isn't a user-facing app, it’s a building block empowering Web3 builders to develop ZTPs operating across different networks.
A dWallet always requires the user to generate a signature, together with a threshold of validators of the massively decentralized Pera Network.
2PC-MPC, the state-of-the-art threshold ECDSA scheme created by the Pera team, enables the first noncollusive scalable signing mechanism.
With dWallets, builders can create ZTPs that operate across multiple networks while maintaining Zero Trust. The logic for what a dWallet signs is determined by the ZTP, and executed by a ⅔ threshold of the massively decentralized Pera Network - with user participation cryptographically enforced.
ZTPs use dWallet technology to interact with different Zones of Sovereignty without losing Zero Trust.
A dWallet has an address on every network, and ZTPs control the logic of whether a signature is generated.
A ZTP built on an L1/L2 can control a dWallet, and since the user is always required it retains the Zero Trust assumptions.
Read the docs and join the community on Discord.