Six libraries. One trait. One verifier.
Every BLS construction the literature has produced in 25 years, wired through a single SignatureScheme interface. Drop-in for any Anchor program. CPI line in, boolean out.
Aggregate verification
yoroi_blsN signatures collapse to one 48-byte G1 point. Two pairings on-chain, 150 CU, constant in N.
The core path. Every validator committee, oracle network, governance council on Solana that needs joint authorisation runs through this. Same-message attestation reduces to exactly two pairings regardless of signer count.
- Validator attestations on slot hashes
- Oracle networks signing prices
- Governance councils approving proposals
- Multisig vaults at scale (> 50 signers)
Threshold (t-of-n)
yoroi_thresholdShamir secret sharing over BLS with recombination in G1. Master key never reassembles, anywhere.
Five-of-seven vaults that fail an audit if any single party can produce the joint key. The final signature is indistinguishable from a single-key BLS signature to the verifier — same 150 CU path.
- Regulated treasuries with audit requirements
- Cross-organization custody
- MPC-backed signing services
Pedersen DKG
yoroi_dkgDistributed key generation with verifiable shares. No trusted dealer, no setup ceremony.
Round-1 commitments published to a shared transcript, per-recipient share dispatch over any authenticated channel, per-share verification against the published commitments. No party holds the full master secret, not even momentarily.
- Threshold deployments that cannot tolerate a one-time master-key holder
- Multi-org custody initialization
- Regulated environments where setup ceremony is auditable
BLS-VRF
yoroi_vrfProof is a BLS signature on the seed. Output is SHA-512 of the proof.
Anyone with the public key can verify the output came from this seed. Unpredictable until the signer commits the signature. Aggregate variant lets a committee jointly produce a single verifiable random output.
- Stake-weighted leader election
- On-chain lotteries with verifiable fairness
- Randomness beacons downstream contracts can consume
Boneh-Franklin IBE
yoroi_ibeEncrypt to any public string before the recipient even has a keypair.
An identity, a future block height, a transaction commitment — encrypt to it directly. The trusted authority issues decryption keys on demand against the identity. Threshold variant splits the authority across a committee.
- Time-locked encryption (encrypt now, decrypt at block N)
- Sealed-bid auctions
- Conditional disclosure protocols
WOTS+ post-quantum
yoroi_pqWinternitz one-time signatures behind the same SignatureScheme trait.
When BLS12-381 gets quantum-broken — the question is when, not if — applications swap one line and keep shipping. Forward insurance. Cheap to ship now, catastrophic to retrofit later when a protocol has thousands of integrations to coordinate.
- Long-lived high-value assets
- Protocols planning multi-year stability
- Insurance against future-quantum scenarios