When run by a distributed set of node operators, the Lit Protocol software provides generalizable, fault-tolerant key management for encryption, signing, and programmable wallets. Users of Lit can leverage advanced features that serve to enhance the security and functionality of web3 applications, namely:
Decentralized Access Control
Lit’s threshold encryption network can be used to introduce private and permissioned data to a host of application categories, specifically by offering a solution to the “public-by-default” nature of blockchains and public storage networks. The Lit software can be applied generally, agnostic to the storage provider and desired use case. Lit provides the capacity for assigning arbitrary logic (access control conditions) for condition-based access control and encryption. Some possible use cases for this functionality include:
Encrypted wallet-based messaging: Secure wallet-to-wallet communication without relying on a centralized key custodian. Examples.
User-owned social and identity graphs (“self-sovereign data”): Empower users with full control over how their personal data is managed on the Web, shifting power away from centralized corporations to individuals. Examples.
Credential-gated spaces: Use token and credential ownership as “keys” to accessing exclusive spaces, content, and experiences, introducing additional utility to digital assets. Examples.
Mempool encryption: This technique can be used to conceal transaction data from Searchers and Block Builders and mitigate the negative externalities of MEV.
Private NFTs: Release NFTs with private embedded content that can only be accessed by the NFT owner themselves.
Open data marketplaces: Open data marketplaces facilitate the exchange of data between individuals and organizations, allowing users to buy, sell, or share information in a secure and transparent manner. These systems promote data-driven innovation by making diverse datasets accessible to researchers, developers, and businesses, while also providing data creators with the opportunity to monetize their own content. Examples.
Programmable Signing and Wallets
Interrelated but distinct from Lit’s decentralized access control product is the ability to create programmable MPC wallets and complex signing automations. Some potential use cases include:
Event listening and condition-based transaction execution: Automate your interactions with blockchain ecosystems using condition-based execution, enabling use cases such as on-chain limit orders or recurring payments that don’t require manual input (i.e. signing off on the transaction) from the end user. Example.
Native cross-chain messaging and swaps: Seamlessly transfer assets and data across blockchain networks without relying on a trusted intermediary or centralized asset bridge. Example.
Seed-phraseless wallet onboarding using web2 authentication and sign-on flows (such as SMS, Discord oAuth, Passkey): Create easier onboarding experiences for non-crypto native users using familiar sign-on methods and abstract away seed phrases and complex private key management, while also providing the full web3 capabilities of an EOA. Examples.
Automated verifiable credential issuance: Verifiable credentials are digital certifications attesting to particular user attributes or qualifications. Using condition-based signing, automate the issuance of these credentials and eliminate the possibility of fraud or human error. Example.
Enterprise signed data applications: There are numerous use cases for cryptographically-verifiable “signed data” in institutional and enterprise environments, such as using digital signatures to authenticate and track goods in physical supply chains. Generating signed proofs over arbitrary Web data: Using digital signatures to verify the provenance and integrity of data sourced from various locations on the open web. Example.
Trustless vault applications: Each key generated by Lit is represented by an ERC-721 token on the blockchain. This means that any assets sent to the Lit key can be traded or sold in a single transaction by selling the NFT that controls the underlying key pair. This facilitates potential trustless “vault” applications where an array of assets may be managed together according to the rules associated with the PKP itself.
Backup, recovery, and progressive self custody for account abstraction (AA): Use Lit to configure robust backup and recovery solutions for AA wallets (such as multi-factor authentication or social recovery methods), helping users avoid the loss of access to their assets due to lost or compromised keys. Get started.
Use PKPs and Actions to automate your interactions across decentralized finance.
- Condition-based transactions (ex. on-chain limit orders).
- Recurring payments.
- Automated vault applications for seamlessly trading asset bundles.
- Sling Protocol: An SDK for automating transactions on popular DEXs. Currently supports Uniswap V3 and 1inch.
- Cask: Automated, recurring payments.
Build powerful infrastructure that harnesses the power of Lit!
- Cross-chain bridges.
- Oracles for off-chain data.
- Event listening and condition-based execution.
- Privacy-preserving transactions.
- Decentralized key custodians.
- Yacht Labs: Cross-chain atomic swaps with PKPs and Lit Actions
- Curve Labs: SDK for building privacy-preserving interactions on-chain
- MagicWallet: One account, multiple seedless wallets
- More coming soon… 👀 —> build with us!
Social applications that empower users with privacy and true data ownership.
- Credentialing systems for privacy-preserving web3 login.
- User owned social graphs.
- Account abstraction with support for web2 auth methods (i.e. Apple Passkey).
- Decentralized chat bots.
- Verifiable, on-chain reputation building.
- Ceramic Integration: Write and permission access to your own private Ceramic data store.
- Krebit: Automated Verifiable Credential issuance.
- Wallet Abstraction demo: Using Google oAuth to create a Lit MPC wallet.
Improve the state of web3 gaming.
- Signing and wallet abstraction for blockchain-based games.
- Condition-based reward systems and achievements.
- Private data for multiplayer games.
You can find even more examples, ideas, and resources here.
Have an idea for a project? Get in touch!