Unlock Autonomy for Wallets.User Data.Agents.Bridges.Vaults.Wallets.

Lit Protocol is the decentralized network for managing keys and secrets. Join the builders using programmable signing and encryption to power AI agents, blockchain interoperability, crypto wallets, and user-owned data.

Integrated with

Tria
Terminal3
Blockchain Creative Labs
Genius
Emblem Vault
Humanity Protocol
Gitcoin
Index Network
Eco
Lens Protocol
Streamr
Tria
Terminal3
Blockchain Creative Labs
Genius
Emblem Vault
Humanity Protocol
Gitcoin
Index Network
Eco
Lens Protocol
Streamr

Loading articles...

Securing the Decentralized World

$154M+

Total Value Managed

1.4M+

Total Wallets Managed

30M+

Data Points Decrypted

Agent Wallets

Universal Accounts For User Controlled Automation

Unlock true agent autonomy without sacrificing user control. Define exactly what agents can do through user-delegated permissions and policies enforced by Lit Actions.

  • universal accounts for every chain and platform
  • user authorization
  • On-chain, open source tools
Create Agent Wallets

Interoperability

Program Private Keys

Break down blockchain silos with programmable private keys for seamless interoperability. Lit Actions allow you to embed immutable signing logic and condition checks directly into on and off chain apps.

  • Automate cross-chain liquidity
  • Build secure, programmable vaults
  • Unify disparate Web3 and Web2 systems under a single, cryptographic control layer
Build with Lit Actions

User Owned Data

Private Data On The Open Web

Build applications where private data lives on the open web but remains verifiably under user control.

  • Define exactly who can decrypt based on dynamic conditions
  • Build user owned data and data marketplaces
  • Put users in control
Build with Encryption

The Lit Network

Defense in Depth

Lit Protocol combines Threshold Multi-Party Computation (MPC) and Trusted Execution Environments (TEE) to secure keys with multiple layers of cryptographic protection. Secrets stay resilient—even if nodes or hardware are compromised.

Scalability

Deploy applications confidently on a globally distributed network. Lit Protocol's infrastructure scales horizontally, automatically meeting demand spikes without sacrificing security or performance.

Orchestrate Any Secret

Manage any private key, credential, or sensitive data across Web3, AI, cloud, and beyond. Lit Protocol's programmable signing and encryption let you securely automate interactions across every environment.

Defense in Depth