![]() | Lit ProtocolIDO Lit Protocol is a decentralized key management network designed to enhance digital security and privacy in web 3 applications. It leverages advanced cryptographic techniques, particularly threshold secret schemes (TSS) and secure encrypted virtualization (SEV), to provide robust solutions for managing keys and enabling secure transactions. Seed Round: $2.2M Series A Round: $13M IMPORTANT: By investing in this business you agree to ourDisclaimer. All information including our rating, is provided merely for informational purposes. CryptoTotem does not provide investment advice. |
Overview
|
What is Lit Protocol
Lit is a decentralized key management and compute network. Builders of apps, wallets, protocols, and AI agents use Lit to advance digital ownership with decentralized keys and private, immutable programs.
The system builds off of contemporary work in applied cryptography, sealed confidential hardware, and peer-to-peer networking to provide the maximum amount of control and privacy to developers.
Developers can use Lit to build apps with private data, intuitive onboarding and wallet management, and private, immutable programs that run based on the rules you set.
DetailsIDO (Legion Launchpad): TBA - TBARaised: 15,200,000 USD LegalRegistration country: United StatesRegistration year: 2022 |
Lit Protocol Roadmap
- Performance Improvements for ECDSA Signing
- ECDSA on NIST Curves
- New Curves Supported:
- P-256 and P-384, essential for security protocols such as TLS and Web2.5 integrations.
- Use Case: Verifiable Web DataLit Protocol will enable developers to fetch data from web sources and provide cryptographic proof that the data was retrieved from a specific source at a particular time.
- Schnorr/EdDSA Signatures (FROST Protocol)
- Ed25519: Commonly used by Solana, Aptos, and many others.
- Sr25519 (Schnorrkel/Ristretto): Integral to the Polkadot ecosystem for scalable, secure signatures.
- Taproot for Bitcoin: Supports advanced scripting capabilities for Bitcoin-based DeFi and other applications.
- Schnorr Variants:
- Secp256k1, P-256, P-384
- RedDSA Variants:
- Jubjub (used in ZCash Sapling, Aztec, and Iden3 protocols).
- Decaf377 (supported by Penumbra).
- Fully Homomorphic Encryption (FHE) Keys
- Threshold Decryption Algorithm: Allows threshold keys to be exportable from the Lit network.
- Use Cases:
- Privacy-Preserving Analytics: Perform advanced computations on encrypted datasets without compromising privacy.
- Secure Data Sharing: Enable encrypted data to be shared with cryptographic assurance of user control.
- Joint Custody: Create digital signatures conjointly between Lit and the client
Project team






 Zhang.jpg)






