Human Keys Infrastructure Built on EigenLayer

Mar 16, 2025

The paradigm shift from limited user control over digital life to self-determination in digital spaces requires capture-resistant infrastructure and user-friendly tech. human.tech’s suite of products is designed and built on a foundational layer of applied cryptography, shared crypto-economic security, and humanistic technology to progress open financial coordination.

human.tech, by Holonym Foundation, provides keys, wallets, and identity to unlock capital flow for airdrops, grants, and payments to humans – not bots, middlemen, or bad actors. Over $380M in capital flow in the form of airdrops and grants for over 2M users have been unlocked with human.tech identity proofs.

Powering this is the Human Network, a threshold network that computes the verifiable oblivious pseudorandom function (vOPRF), an important cryptographic primitive enabling perfect crypto onboarding.

Human Network is Secured with EigenLayer

The Human Network, built as an Autonomous Verifiable Service (AVS) – derives its privacy, resilience and permanence from Ethereum’s verifiable trust network, through shared security from EigenLayer restaking. Over $1.4B in restaked ETH has been committed to power the perfect crypto onboarding and proof of humanity for up to 34.5M credentials with Human Keys.

Credible Commitments on EigenLayer

Based on Sreeram Kannan's commitment thesis, services on EigenLayer represent commitments against restaked ETH, with slashing and reward mechanisms to enforce them.

Human Network enforces these commitments cryptographically, granting self-custodial keys (we call them Human Keys) and private nullifiers (cryptographic values that prevent identity duplication). This service is accessible to anyone with an internet connection or to applications built on top, ensuring no two users possess the same key, and no personal data is exposed or made traceable by any third party.

Distributed Computation of Human Data

Human Network uses threshold computation of Human Data to safely create Human Keys, the tool for perfect crypto onboarding. With Human Keys, users can easily create a wallet with their biometrics or other personal attributes and produce private identity proofs. The safety and privacy of the network are underpinned by the $1.4B in committed security through EigenLayer restaking.

Human Network will launch mainnet soon, having already secured 4.7M in restaked ETH, with participation from 20+ node operators. With the acquisition and integration of Human Passport (formerly Gitcoin Passport) into the human.tech suite, over 34.5M user credentials are soon to be migrated to the network in order to produce zero-knowledge-friendly identity proofs, making Human Network’s AVS a top provider for secure user identity and proof of humanity in Web3.

“The Human Network enables us to decentralize credentials, increase privacy, and seamlessly transition Human Passport’s (formerly Gitcoin Passport) 34.5M credentials to zk proofs over time.”

– Jeremy Dillingham, Co-founder of Human Passport

Human Network Powers Real World Use Cases

What makes the Human Network powerful? Human Network’s implementation of vOPRF addresses three challenges that remained infeasible with privacy and security: easy onboarding, programmable privacy, and secure duplicate prevention.

Intuitive Keys for Easier Onboarding

The network enables anyone to create cryptographic keys based on familiar authentication methods and human attributes such as passwords, social logins, government IDs, and security questions. This abstracts the key creation and recovery process, making keys self-custodial and cross-device compatible despite being human-friendly without seed phrases. These Keys can be used by dApps for easier onboarding, or directly accessible to users through human.tech’s Human Wallet.

Human Wallets put Human Keys into action. The Keys in Human Wallet are secured with Two-Party Computation (2PC) to provide programmable security for transactions. 2PC is an emerging wallet security framework for eliminating many common attack vectors on self-custodial wallets, such as blind-signing.

Programmable Privacy through Provable Encryption of Identity

Human Network enables users to encrypt sensitive data while proving it was encrypted correctly, and to set specific conditions for when it can be decrypted. The network never sees or stores the encrypted data itself, it only assists in decryption when specific on-chain conditions are met. This is particularly useful for compliance use cases and under collateralized lending, to decentralize decryption of selected parties or bad actors to stay compliant, provide audit trails, while providing privacy to legitimate users. Holonym's Proof of Clean Hands, deployed on Aztec Network, will soon go live as a production-ready implementation.

Secure Nullifiers for ZK Identity

Zero-knowledge identity protocols rely on nullifiers to prevent double-spending and traceability. Human Network’s cryptographic primitives provide decentralized and privacy-preserving nullifiers, ensuring secure identity verification without compromising decentralization. This innovation enhances the integrity of zero-knowledge identity systems while maintaining scalability and resistance to collusion.

Why Human Network is built as an AVS

The network can implement privacy conditions and compliance rules directly during the initial data encryption and identity verification processes, eliminating multiple post-processing steps and significantly reducing computational overhead. This helps to achieve scalable private key generation across user side authentication.

To maintain integrity of core network services, EigenLayer's operators play a crucial role by performing distributed OPRF computation in a threshold setup, where at least t out of n nodes must participate to derive keys and decrypt data. Honest behavior of nodes is ensured through lightweight zero-knowledge proofs attesting to individual computation, and Forward-Secret Public Key Encryption (FSPKE) for additional security. Operators receive rewards proportional to their computational contributions, while any dishonest behavior can be cryptographically detected to enforce slashing conditions.

Perfect Onboarding Secured with Human Network

DKG for crypto key derivation and simple onboarding requires minimal trust assumptions and resilient network architecture to maintain uptime. Human Network uses the AVS architecture to quickly bootstrap security and decentralize the service offering. This architectural choice significantly reduces development overhead while ensuring robust security guarantees.

The result is a perfect onboarding experience, persistently made available through a decentralized network for any users to derive keys through user-friendly authentications. These keys enable secure interactions both online and on-chain, while allowing zero-knowledge identity proofs on user devices. Human Network’s inclusive identity layer will continue to direct capital flows to real humans secured by Eigen Layer’s AVS.

About Human Network

Human Network, previously Mishti Network, creates secure cryptographic keys using familiar user-side authentication methods like web accounts and biometrics with programmable key management and private identity proofs. The Human Network generates Human Keys.

About Human Keys

Human Keys are human-friendly cryptographic keys generated from what you have, what you are, or what you know. They grant you control over your digital assets while being easily recoverable and highly secure against hacks.

About human.tech

human.tech is a suite of technologies designed to enhance personal freedom, privacy, and financial autonomy. human.tech provides innovative solutions for secure identity, data ownership, and private transactions, ensuring that technology remains a tool for human empowerment.

Newsletter

A bright future is here

Human-centric technology that fosters freedom, resilience, and opportunity in a connected, borderless digital world with hard digital rights for personhood, privacy, security, and prosperity

© 2025 Human Tech. All rights reserved.

A bright future is here

Human-centric technology that fosters freedom, resilience, and opportunity in a connected, borderless digital world with hard digital rights for personhood, privacy, security, and prosperity

© 2025 Human Tech. All rights reserved.