Skip to main content

Overview

The Custody domain encompasses wallet operations, key management systems (KMS), hardware security modules (HSM), and governance controls required for institutional digital asset custody.
Key Focus: Secure key management with regulatory access controls, freeze/blacklist capabilities, asset segregation, recovery mechanisms, and post-trade hook integration.

Core Requirements

Key Management

KMS/HSM integration with threshold signatures and secure key generation/storage

Governance Controls

Multi-party approval workflows, freeze mechanisms, and blacklist enforcement

Segregation

Asset segregation across clients with cryptographic separation guarantees

Recovery

Key recovery procedures with governance controls and audit logging

Technical Considerations

Implement view keys or zero-knowledge proofs that allow regulated disclosure of holdings and transactions to authorized parties without compromising general privacy.
Integrate custody systems with smart contract hooks that enforce compliance checks, settlement confirmations, and regulatory reporting requirements automatically after trade execution.
Maintain tamper-evident logs of all custody operations (key usage, approvals, freezes) with cryptographic commitments for regulatory audit and dispute resolution.
Use threshold signatures (TSS) or multi-party computation (MPC) to eliminate single points of failure in key management while maintaining operational efficiency.

Cross-Domain Nature

Custody is a foundational domain referenced across Payments, Trading, and Funds & Assets workflows. Nearly all institutional operations require integration with custody infrastructure.

Primary Use Cases

Custody patterns are embedded within domain-specific use cases rather than standing alone. See Payments and Funds & Assets flows for custody integration examples.

Shortest-Path Patterns

These patterns provide proven approaches for institutional custody requirements:

Selective Disclosure (View Keys + Proofs)

Grant regulators access to specific transaction details without compromising overall privacy

Atomic DvP via ERC-7573

Custody integration with atomic settlement guarantees

Adjacent Vendors

Kaleido Paladin

Enterprise privacy and custody orchestration layer with HSM integration

Integration Points

Custody systems must authorize and sign payment transactions while maintaining private key security. View key disclosure enables payment audit without compromising custody security.
Trade execution requires custody approval workflows and post-trade settlement hooks. Atomic DvP patterns coordinate custody systems across counterparties.
Custody operations must enforce KYC/AML policies, freeze sanctioned addresses, and provide evidence for regulatory inquiries through selective disclosure.

Payments

Custody authorization for stablecoin and cash movements

Trading

Key management for trade execution and settlement

Identity & Compliance

Governed regulator access and credential verification
Custody is not typically a standalone use case but rather a critical component integrated throughout institutional workflows. Review domain-specific use cases for custody implementation details.

Build docs developers (and LLMs) love