~15 min. read

MPC Wallet-as-a-Service (WaaS): A Guide to Key Ownership, Security Models, and Institutional Compliance

Talk to Our Expert

The Cost of Getting Wallet Infrastructure Wrong

A financial institution sets out to build its own wallet infrastructure instead of adopting a Wallet-as-a-Service (WaaS) platform. The scope looks contained: key management, multi-chain support, a governance layer for transaction approvals. Eighteen months later, the team is still not live. The cryptographer hired for the project left midway through. A security audit found a flaw in the key management design that required rebuilding from scratch. The compliance team has just flagged that the approach doesn't meet the custody requirements for the markets they're entering.

Going custodial carries its own problems. In February 2025, the ByBit exchange suffered the largest single crypto theft in history: $1.5B, traced to a compromise of its wallet key infrastructure, according to the Chainalysis 2025 Crypto Crime Mid-Year Update. A third party holding your keys means your security is bounded by their systems, their staff, and their operational decisions. When those fail, the assets are gone.

The root issue in both scenarios is the same: key management is hard to get right, and the cost of getting it wrong doesn't reveal itself upfront. It surfaces months into a build, or the morning after a breach, or in a regulatory review where the examiner asks for documentation that doesn't exist.

What Is Wallet-as-a-Service?

Wallet-as-a-Service (WaaS) is a managed infrastructure model that allows organisations to deploy and operate digital asset wallets without building the underlying technology themselves. Rather than constructing key management systems, transaction signing logic, and multi-chain integrations from scratch, a team integrates with a WaaS provider via API and gains immediate access to production-ready wallet infrastructure.

The defining characteristic of modern WaaS is where key control sits. In custodial models, the original architecture used by most early exchanges and wallet providers, the service operator holds the private keys on behalf of clients. This creates a single point of trust and, consequently, a single point of failure. Non-custodial WaaS built on MPC (Multi-Party Computation) changes this fundamentally: key material is distributed so that no single party, including the WaaS provider, ever holds or reconstructs the full private key. Institutions retain cryptographic ownership of their assets.

WaaS is most commonly adopted by financial institutions, fintech companies, exchanges, payment processors, and corporate treasury teams entering the digital asset space. The reasons are consistent: building wallet infrastructure in-house requires specialised cryptographers, blockchain engineers, and security architects, alongside ongoing audit and compliance overhead. WaaS converts that capital-intensive build into an operational service, letting teams focus on their product rather than the infrastructure underneath it.

The category emerged as a direct response to the failures of early custodial models. In crypto's first decade, exchanges and service providers held private keys on behalf of their clients, a model that produced a string of catastrophic losses when those centralised key stores were breached. Hardware wallets improved individual security but created operational friction at institutional scale. MPC-based WaaS emerged as the institutional answer: the security properties of self-custody, the operational simplicity of a managed service, and the governance controls that regulated entities require.

Key Takeaways

  • WaaS is managed wallet infrastructure delivered as a service. Organisations integrate via API instead of building key management, transaction signing, and multi-chain support themselves.

  • MPC eliminates the single point of key exposure: no full private key ever exists in one place, even during the signing process, unlike HSMs or custodial models.

  • Key ownership is the critical variable. Non-custodial MPC architecture gives institutions cryptographic control of their assets; custodial models place that control with the provider.

  • Building wallet infrastructure in-house typically costs $30K–$200K+ upfront and takes 6–18 months, before ongoing maintenance, security audits, and compliance work.

  • 130+ jurisdictions now operate digital asset compliance frameworks. Obligations including FATF Travel Rule, AML/KYC, and MiCA require tooling that most teams cannot build quickly enough on their own.

  • When evaluating a WaaS provider, verify the MPC scheme, confirm client-side key ownership, assess governance controls, review native compliance tooling, and validate uptime SLAs before committing.

Custody Models Compared

How you hold digital assets is as much a business decision as a technical one. The three dominant models, custodial, self-custody, and WaaS, differ fundamentally in who controls the keys, who bears the liability, and what operational overhead they impose.

DimensionCustodialSelf-CustodyWaaS (MPC)
Key ControlProvider holds keys on behalf of clientClient holds keys entirelyKeys distributed; client retains cryptographic control
Single Point of FailureYes: provider's infrastructureYes: client's key storageNo: threshold signing required
Counterparty RiskHigh: assets at risk if provider is breached or failsNoneLow: client retains independent key shares
Operational OverheadLow: provider manages operationsHigh: client manages everythingLow: provider manages operations, client owns keys
Regulatory TreatmentClient assets may appear on provider's balance sheetOff-balance sheet; full client controlOff-balance sheet; client-controlled
Recovery OptionsProvider-managed recoverySeed phrase backup: single point of loss riskKey resharing without key exposure
Audit TrailProvider-managed; limited client visibilityOn-chain onlyFull audit trail with configurable access

The Cost of Getting It Wrong

Wallet infrastructure is not a feature to be deprioritised. The financial and operational risks of inadequate custody compound over time, and the regulatory window to fix them is narrowing.

Crypto Theft Is Accelerating

The Chainalysis 2025 Crypto Crime Mid-Year Update recorded over $2.17B stolen in crypto hacks in H1 2025, including the $1.5B ByBit breach. That incident was the largest single crypto theft in history, traced directly to a compromise of the exchange's wallet key infrastructure. Organisations running custom-built or underpowered wallet infrastructure are disproportionately targeted. MPC architecture eliminates the key exposure vectors that make these attacks possible.

In-House Builds Cost More Than Most Teams Budget For

A production-ready, non-custodial, multi-chain wallet build typically exceeds $200K, before ongoing maintenance, security audits, and compliance work. Basic infrastructure starts at $30K–$60K, but most teams significantly underestimate the full scope. These figures reflect direct costs reported across documented institutional builds; your organisation's number depends on team structure and compliance requirements. WaaS converts that capital expenditure into a predictable operational cost.

5 Advantages of Wallet-as-a-Service (WaaS) for Crypto Businesses →

Your Competitors Are Already Shipping

Building wallet infrastructure from scratch typically takes 6–18 months and requires specialised cryptographers, blockchain engineers, and security architects, a team most organisations don't have. WaaS providers reduce that timeline to days, freeing engineering capacity for product work rather than infrastructure maintenance.

Regulatory Pressure Is Not Slowing Down

FATF Travel Rule compliance, MiCA obligations in Europe, and VASP registration requirements across Asia are creating complex compliance burdens for any organisation touching digital assets. With 130+ jurisdictions now operating digital asset compliance frameworks, the regulatory surface area is only expanding. Platforms that treat compliance as a first-class concern, rather than assembling it from third-party tools, are better positioned to meet these obligations as they evolve.

DAC8 Crypto Reporting Guide (2026): Why WaaS Beats Manual Compliance →

Built on Four Security Layers

A well-designed WaaS platform is engineered around a layered security architecture. Each layer handles a distinct operational concern, so every component can be hardened, audited, and upgraded independently, without compromising the others.

Key Ownership Layer

Your assets stay under your control. Key material is distributed so no single breach, including of CoinsDo's own systems, can expose your funds.

Wallet Operations Layer

One API integration covers 20+ blockchains. Address generation, deposit detection, and withdrawal execution run automatically: no manual handoffs, no per-chain builds.

Governance & Approval Layer

Every transaction is subject to your rules before it touches the network. Approval chains, spending limits, and whitelist policies are fully configurable to match your organisation's risk model.

Identity, Compliance & Fraud Layer

KYC/AML integration, Travel Rule support, and transaction monitoring are built into the platform, not assembled from third-party services. Meet your regulatory obligations without building for them.

MPC vs HSM vs Multi-Signature

The architecture you choose has permanent implications for key control, operational flexibility, and regulatory compliance. Here's how MPC, Hardware Security Modules, and multi-signature compare, and where each breaks down.

CapabilityMPCHSMMulti-Signature
Key ControlDistributed: no single party holds the full keyCentralised inside tamper-proof hardwareSplit across multiple on-chain addresses
Single Point of FailureNone: threshold signing requiredYes: hardware failure or theft is criticalPartial: losing enough signers locks funds
Hardware DependencyNone: software-based, cloud-nativeRequired: tied to physical deviceNone: script-based
Operational FlexibilityHigh: programmable policies, no hardware constraintsLow: hardware-bound, complex to updateMedium: limited to on-chain script logic
Multi-party SigningNative: off-chain threshold ceremoniesNot supported nativelyNative: on-chain m-of-n scheme
Compliance-ReadyYes: audit trails, policy enforcementYes: certified for financial servicesPartial: limited auditability
Developer IntegrationAPI-first, cloud-native, fast onboardingComplex: vendor-specific SDKsModerate: blockchain-native but inflexible
Key RecoveryKey resharing without key exposureHardware backup and restorePer-signer key backup required

Built For Your Use Case

Whether you're launching a custody product, managing treasury assets, or powering a stablecoin, WaaS infrastructure removes the build overhead so your team can focus on the product.

Digital Asset Custody

Challenge

An institution building a custody product needs infrastructure that satisfies regulators, passes audits, and handles assets across multiple blockchains, without standing up a separate engineering effort for each chain.

Solution

MPC WaaS provides the custody architecture by design: distributed key material so clients retain cryptographic control, wallet segregation at the account level, and a unified API across 20+ chains. Audit trails, Travel Rule support, and AML screening are built into the platform, not assembled from separate vendors.

Impact

Teams onboard custody clients faster, meet regulatory requirements without a custom build, and add new chains without additional engineering work.

Learn more about digital asset custody

Stablecoin Infrastructure

Challenge

A stablecoin issuer needs to manage high-volume minting, burning, and cross-chain transfers simultaneously, with approval controls that prevent unauthorised movements and Travel Rule compliance for cross-VASP flows.

Solution

WaaS handles the multi-chain operational layer: programmatic minting and burning via API, policy-based thresholds that require approval above defined amounts, and native Travel Rule data collection. Automated sweep policies manage float across hot and cold wallets without manual oversight.

Impact

Operations that previously required manual coordination across multiple systems run automatically within policy, with full audit trails included.

Crypto Treasury Management

Challenge

A corporate treasury team holds and moves digital assets for settlement, but their current setup, hardware wallets and a custodial account, has no approval hierarchy and no way to produce audit records for the finance and compliance teams.

Solution

WaaS provides configurable approval workflows: transactions below a defined threshold auto-execute; larger movements require multi-party sign-off. Address whitelisting restricts outbound destinations. Reporting exports slot into existing finance workflows.

Impact

Treasury operations get the control structure needed for internal compliance without losing the execution speed needed for settlement.

Exchanges & Fintech

Challenge

A fintech platform embedding crypto payments needs to support multiple assets on launch, integrate with its existing AML provider, and maintain uptime commitments, without pulling its product team off roadmap work to build and maintain wallet infrastructure.

Solution

WaaS integration via REST API delivers multi-chain wallet operations from day one, with pre-built AML integrations and SLA-backed uptime. Hot/cold separation with automated sweeps manages the liquidity-vs-security tradeoff without manual treasury operations.

Impact

The product team ships on schedule. Chain additions, compliance tooling, and infrastructure maintenance are handled by the provider as the platform scales.

WaaS vs In-House Build

The decision to build or buy wallet infrastructure affects cost, timeline, security posture, and regulatory exposure. Here is how the two approaches compare.

CapabilityCoinsDo WaaSIn-House Build
Time to LaunchDays6–18 months
Key Ownership100% client-controlledDepends on implementation
MPC SecurityIncluded, battle-testedRequires specialised cryptography team
Regulatory ComplianceBuilt-in frameworks (AML, Travel Rule, KYC)Must build and maintain independently
Multi-chain Support20+ chains, API-unifiedChain-by-chain build and integration
Upfront CostSubscription-based, predictable$30K–$200K+
Maintenance & UpgradesManaged by CoinsDoOngoing internal engineering cost
Security AuditsContinuous, includedPeriodic, additional cost

Wallet-as-a-Service vs Building In-House: Cost, Time, and Security Trade-offs →

How WaaS Integration Works

From a developer's perspective, WaaS integration involves four distinct workflows. Understanding each one clarifies what your team is actually connecting to, and what the platform handles on your behalf.

01

Authentication and Wallet Setup

Integration begins with API authentication and workspace configuration. Your team connects via REST API or SDK, creates wallet structures appropriate to your use case (operational hot wallets, reserve cold wallets, segregated wallets per user or entity), and configures the governance policies that will govern every subsequent transaction. This phase is largely a one-time setup; the API is the only external dependency your application takes on.

02

Address Generation

Once wallets are configured, deposit address generation is on-demand. A single API call returns a valid deposit address for any supported blockchain (Bitcoin, Ethereum, TRON, Solana, and others) without requiring chain-specific integration work on your side. Addresses are deterministically generated from your wallet hierarchy and ready to receive funds immediately.

03

Deposit Detection

Incoming transactions are monitored automatically across all configured chains. The platform detects confirmed deposits and fires webhook callbacks to your endpoint with full transaction metadata: asset type, amount, sender address, confirmation count, and wallet context. Your application processes the webhook rather than polling multiple blockchains directly, which removes the node infrastructure requirement entirely.

04

Withdrawal and Signing

Outbound transactions are submitted via API and pass through your configured approval workflow before being signed and broadcast. Approvals can execute automatically within policy parameters or require multi-party authorisation. The MPC signing ceremony takes place off-chain: no full private key is ever assembled at any point in the process, and the signed transaction is broadcast directly to the network.

Compliance Included, Not Bolted On

Regulatory requirements are expanding faster than compliance teams can build for them. The most defensible approach is infrastructure that meets these obligations by design, not through after-the-fact integration of third-party tools.

FATF Travel Rule

Native support for originator and beneficiary information collection and transmission across qualifying transactions.

AML & KYC Integration

Pre-built integrations with leading AML screening and KYC verification providers. Configurable risk thresholds and automated flagging workflows.

MiCA Readiness

Architecture and data practices aligned with MiCA requirements for crypto-asset service providers operating in or serving EU markets.

WaaS and MiCA Compliance: Asset Segregation Explained →

SOC 2 Type II Infrastructure

CoinsDo's platform is built on SOC 2 Type II-aligned infrastructure with access controls, audit logging, and incident response procedures.

VASP Registration Support

Documentation, audit trails, and operational controls designed to support VASP registration processes across multiple jurisdictions.

Transaction Monitoring

Real-time transaction monitoring with configurable rules, automated alerts, and full audit trails for regulatory reporting.

Is Your Current Approach a Liability?

Most institutions find out their wallet infrastructure is a problem when the cost of changing it is already significant. These are the warning signs worth checking before that happens.

You're building in-house and the timeline has already slipped past the original estimate.

A third party holds your private keys, with no contractual protection if they're breached or become insolvent.

Your engineering team spends more time maintaining wallet infrastructure than building product features.

You can't produce a clean audit trail of key management decisions for your compliance team or a regulator.

Approving large transactions depends on manual coordination: emails, messages, or in-person sign-offs.

Adding a new blockchain requires a separate integration project.

Your key recovery procedure involves reconstructing a full private key, or you don't have a documented procedure at all.

You're entering a regulated market and your key management approach hasn't been reviewed against local custody requirements.

If more than two of these apply, the question isn't whether your approach needs to change. It's how much time you have before it becomes a problem.

Key Terms Glossary

A reference for the core technical and regulatory terms that appear throughout this guide.

MPC (Multi-Party Computation)

A cryptographic technique that distributes computation across multiple parties so that no single party has access to all inputs. In wallet infrastructure, MPC enables threshold signing: a transaction can only be authorised when a required number of key shares cooperate, without any individual share ever seeing the full private key.

Key Shard / Key Share

A fragment of a cryptographic key generated during an MPC key generation ceremony. Key shards are mathematically related but individually useless: no single shard can derive the full private key. The key only 'exists' implicitly, when enough shards cooperate to produce a valid signature.

Threshold Signing

The process by which an MPC wallet produces a transaction signature. A defined threshold of key share holders (for example, 2 of 3) must participate in a signing ceremony. If the threshold is not met, no valid signature can be produced and the transaction cannot be broadcast.

Key Generation Ceremony

The initial process by which MPC key shares are created and distributed to their respective parties. A properly implemented key generation ceremony ensures that no single device or party ever holds a complete private key, not even momentarily during setup.

Key Resharing

An MPC operation that rotates key material to a new set of parties without ever reconstructing or exposing the underlying private key. Used when party composition changes, such as when an employee with a key share departs, or as a scheduled proactive security measure. Unlike traditional key rotation, resharing does not require generating a new wallet address or moving funds on-chain.

Non-Custodial

A wallet or infrastructure model in which the service provider cannot access or move client funds unilaterally. In a non-custodial WaaS arrangement, the provider facilitates operations but does not hold key material that would allow independent asset movement.

VASP (Virtual Asset Service Provider)

A legal designation applied under FATF guidelines to entities that exchange, transfer, or provide custody of virtual assets as a business. VASPs are subject to AML and KYC requirements and, in many jurisdictions, formal registration or licensing obligations.

Travel Rule

A FATF recommendation, adopted as binding regulation in many jurisdictions, requiring VASPs to collect and transmit originator and beneficiary information for transfers above a defined threshold. The requirement mirrors the travel rule applied to wire transfers in traditional banking.

Hot Wallet / Cold Wallet

A hot wallet is connected to live signing infrastructure and used for operational transactions. It can sign and broadcast immediately. A cold wallet holds key shares in offline or air-gapped environments, requiring additional steps to initiate a transaction. Institutional deployments typically maintain both, separating working capital from reserves.

Governance Policy

A configurable ruleset applied to outbound transactions before they can be signed. Policies can enforce spending limits, address whitelists, required approvers, time-locks, and multi-party approval chains, allowing organisations to mirror their internal risk controls at the infrastructure level.

How to Evaluate a WaaS Partner

Not all WaaS providers are built alike. Before committing to a vendor, verify these five criteria: they separate production-ready platforms from proof-of-concept products.

01

Verify the MPC Architecture

Ask for technical documentation on the MPC scheme used (2-of-2, 2-of-3, or higher). Confirm that no single node ever reconstructs the full private key, not even temporarily. Request audit reports.

02

Confirm Key Ownership

You should own your keys. Verify that the vendor cannot unilaterally access or move your assets. Review the key generation and storage documentation. If the vendor cannot show you this, walk away.

03

Assess Governance Controls

Production infrastructure needs configurable approval policies, spending limits, and address whitelisting. Ask for a demo of the policy engine and confirm it can model your organisational approval hierarchy.

04

Review Compliance Tooling

Ask which AML/KYC providers are natively integrated. Confirm Travel Rule support and understand the data handling model. Check whether compliance tooling is bolt-on or first-class.

How to Choose a Wallet-as-a-Service Provider (WaaS) in 2026 →
05

Validate Uptime and SLA

Wallet infrastructure must be available 24/7. Confirm SLA commitments (99.9% minimum), review incident history, and understand the failover architecture. Ask for references from comparable-scale clients.

The Top 5 Wallet-as-a-Service Providers in 2026 →

A Decision You Make Once

The decision about wallet infrastructure gets made once, and then every digital asset operation the organisation runs depends on it. What the previous sections have established: key ownership is the variable that determines your exposure to both technical failure and counterparty risk; the compliance and governance requirements are real, documented, and already enforced in the jurisdictions most institutions are entering; and building the infrastructure yourself is not a cost-saving strategy: it is a capital expenditure that takes longer and costs more than any team plans for.

MPC-based WaaS addresses all three at once. Key material is distributed across parties without ever reconstructing the full private key. Compliance tooling is built into the platform, not engineered separately. Integration takes days rather than months. The institutions that have deployed this architecture are not ahead because they found a clever shortcut. They are ahead because they did not spend 18 months building infrastructure that already existed.

CoinsDo's WaaS is deployed by financial institutions, exchanges, payment processors, and corporate treasury teams operating across regulated markets. If you want to see how it fits your specific use case, the next step is a direct conversation.

Frequently Asked

Questions

What is Wallet-as-a-Service (WaaS)?

How is MPC different from traditional multi-signature wallets?

Who owns the private keys in CoinsDo's WaaS?

How long does it take to integrate CoinsDo WaaS?

What blockchains does CoinsDo WaaS support?

What is the difference between WaaS and a custodial wallet?

How much does WaaS typically cost?

What happens if a WaaS provider shuts down or is acquired?

What is key resharing and why does it matter?

Can WaaS infrastructure support DeFi and smart contract interactions?

Does WaaS support all blockchains?

What security certifications should a WaaS provider have?

About CoinsDo

CoinsDo is an MPC Wallet-as-a-Service provider built for financial institutions, exchanges, payment processors, and corporate treasury teams managing digital assets at scale. CoinsDo's infrastructure handles key management, transaction governance, multi-chain support, and compliance tooling, giving institutions cryptographic ownership of their assets without the overhead of building and maintaining that infrastructure themselves. CoinsDo operates across regulated markets and serves organisations ranging from licensed virtual asset service providers to banks and fintechs entering the digital asset space.