HOT Protocol is a decentralized infrastructure layer designed to facilitate chain abstraction by enabling smart contracts to securely own and manage private keys. Developed by HOT Labs, the protocol utilizes a combination of Multi-Party Computation (MPC), Trusted Execution Environments (TEEs), and the NEAR Protocol as a state and coordination layer. Its primary function is to allow users and smart contracts to interact with numerous blockchains through a single account, abstracting away the complexities of cross-chain operations and asset management. [1] [2]
The HOT Protocol was created to address a fundamental limitation in blockchain technology: smart contracts, by design, cannot securely store private key information on-chain due to the public and transparent nature of blockchain state. This prevents them from directly controlling assets or performing actions on external cryptographic networks. HOT Protocol provides a solution by creating an off-chain MPC network that acts as a decentralized signer, executing actions on behalf of a smart contract only after receiving explicit, on-chain authorization. [3]
The protocol's core mission is to create a more unified and seamless Web3 experience. It is built on several key technological pillars, including HOT Chain Signature, an MPC-based signing mechanism; Omni Tokens, a standard for multi-chain assets; and a native utility token, HOT. The ecosystem includes a suite of products ranging from wallets and exchanges to developer Software Development Kits (SDKs), aiming to simplify interactions for both end-users and developers. The core logic of the protocol's on-chain components is deployed on the NEAR blockchain, which was chosen for its infrastructure advantages. [1] [4]
The system is designed to be chain-agnostic, supporting interactions with both EVM-compatible networks and non-EVM chains such as Solana, TON, and Stellar. By securely delegating signing capabilities to smart contracts, the protocol enables the development of advanced applications like passkey-based Bitcoin wallets, complex account recovery mechanisms, and dApps that can manage assets across multiple chains from a single interface. [2]
HOT Protocol was developed by HOT Labs, with its foundational architecture detailed in a whitepaper authored by Peter Volnov, Georgii Kuksa, and Andrey Zhevlakov. The paper, titled "HOT Protocol," was first submitted to the arXiv preprint server on December 1, 2025. It outlined the protocol's cryptographic design, security model, and technical implementation. [2]
Prior to the paper's publication, a testnet was launched, which featured 12 MPC nodes distributed across five different cloud providers. A notable proof-of-concept demonstrated on the testnet was a passkey-enabled Bitcoin wallet operating on the NEAR mainnet, showcasing the protocol's ability to link modern biometric security with legacy blockchains. [5] As of February 2026, the protocol's Betanet is live and accessible to users. [6]
The project's launch followed a phased roadmap:
By February 2026, numerous features had been released, including integrations for Bitcoin, Ledger, and Tron, cross-chain swaps, and the release of mobile and browser extension wallets. [1]
HOT Protocol's architecture combines on-chain contracts for state management with a decentralized off-chain network for secure computation. It is designed around a pull-based mechanism where a third party can request a signature, which the MPC network produces only after verifying authorization from the key-owning smart contract on its respective chain. [3]
MPC Network (HOT Chain Signature): This is the core of the protocol, comprising a network of independent validator nodes that collectively manage private keys. Instead of a single key, each validator holds a cryptographic share of a root key using Shamir's Secret Sharing. A transaction can only be signed when a predetermined threshold of validators (t-of-n) cooperate to generate partial signatures. The full private key is never reconstructed in a single location, which significantly enhances security by eliminating single points of failure. The protocol is designed as an open and decentralized network, in contrast to centralized MPC solutions controlled by a single entity. [1] [3]
Trusted Execution Environments (TEEs): Each node in the MPC network runs its software within a TEE, such as Intel TDX or AMD SEV. A TEE is a secure and isolated hardware environment that ensures the confidentiality and integrity of code and data, even from the node operator. All private key share computations and contract authorization checks occur inside the TEE. Nodes must perform periodic remote attestation, a process where they cryptographically prove to the on-chain controller contract that they are running the correct, unaltered code within a genuine TEE. [5]
On-Chain State Layer (NEAR Protocol): The NEAR blockchain serves as the decentralized and efficient state layer for the system. It hosts two critical smart contracts:
key_id) and the address of the smart contract that is authorized to approve its use. [3]Gatekeeper Network: This is an access control layer of relay servers that sits between users and the MPC network. Gatekeepers are responsible for aggregating user signing requests, sampling available MPC nodes, and preventing spam or DDoS attacks. They are stateless and do not handle any secret data. [5]
Key-Owner Contract: A smart contract deployed on a target blockchain that "owns" a private key managed by the MPC network. Developers must implement a specific read-only function, hot_verify(message, key_id, metadata), which the MPC nodes call to authorize or deny a signing request. This function contains the custom logic that determines whether a transaction should be signed. [3]
t available MPC nodes.hot_verify method on the Key-Owner contract on the target blockchain to confirm the request is authorized.t nodes collaboratively compute their partial signatures inside their respective TEEs.The protocol employs several established cryptographic techniques to ensure security and functionality.
Distributed Key Generation (DKG): Based on the protocol by Gennaro et al. (2007) to establish the initial key shares without a trusted dealer.
Key Derivation: Uses a deterministic derivation method inspired by BIP-32, enabling the creation of multiple child keys from a single root key without requiring a new DKG ceremony.
HOT Labs has developed a comprehensive ecosystem of products and services built on the core protocol to showcase its chain abstraction capabilities. [1]
Omni Tokens are a key feature, designed to exist natively across multiple blockchains. Users can deposit or withdraw these tokens from any supported chain, with bridging designed to take approximately 30 seconds for the cost of a single token transfer fee. The protocol also enables gas-free swaps, allowing users to trade Omni Tokens for native assets on any supported chain directly within their omni balance. The Solidity implementation for Omni Tokens has been open-sourced and audited by Hacken. [1]
HOT is the native utility token of the HOT Protocol, essential for the network's operation, security, and economy. [1]
The protocol's foundational whitepaper outlines a governance model centered around a utility token (referred to in the paper as gTOKEN, which corresponds to the public-facing HOT token). This model includes distinct participant roles with economic incentives to ensure network integrity. [3]
A slashing mechanism is in place to enforce network integrity. Validators and other staked participants risk having their staked HOT tokens "cut" or slashed if they engage in malicious behavior, such as non-compliance or replay attacks. [1] [5]
Security is a central component of the protocol's design, employing a multi-layered approach. The use of a decentralized network of independent validator nodes, where no single entity possesses the full private key, forms the foundation of its security model. All communication between users and nodes is end-to-end encrypted, and the use of TEEs ensures that key material and cryptographic computations are isolated and confidential. [1]
The threat model is designed to be secure against a computationally bounded adversary that can corrupt fewer than the threshold number of MPC nodes (f < t). The protocol assumes the security of its underlying cryptographic primitives and the TEE hardware. [3]
The protocol's smart contracts and infrastructure have undergone multiple third-party security audits from firms including:
As of early 2026, the protocol reported significant user adoption, with over 30 million wallets created and more than 1 billion transactions processed across over 100 supported blockchains. [1]
The validator network is secured by a number of trusted partners running nodes, including:
HOT Protocol has established collaborations and integrations with a wide range of projects across DeFi, infrastructure, and security. Key partners include the Stellar Foundation, Kava, PancakeSwap, Jupiter, and Helius. [1] The team has also worked closely with projects like Gonka, for which it built the primary decentralized exchange, and PublicAI, to enable NFT staking on the HOT Craft platform. [6]