Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Shutter Network

A decentralized protocol that uses threshold cryptography to encrypt transactions and votes, preventing frontrunning and MEV extraction on blockchains.
Chainscore © 2026
definition
BLOCKCHAIN SECURITY PROTOCOL

What is Shutter Network?

A decentralized protocol designed to prevent frontrunning and malicious Maximal Extractable Value (MEV) in blockchain transactions by encrypting them until they are finalized.

The Shutter Network is a decentralized threshold cryptography network that provides transaction encryption as a service for decentralized applications (dApps) and blockchains. Its core mechanism uses a Distributed Key Generation (DKG) protocol to create a shared public key, allowing users to encrypt their transactions before submission. These encrypted transactions are included in a block but remain unreadable by validators, sequencers, or potential attackers, thus neutralizing frontrunning and sandwich attacks.

The decryption process is triggered only after the block is finalized. The network's keypers—a decentralized set of nodes—collaboratively decrypt the transactions using their individual private key shares. This threshold decryption ensures no single entity can access the transaction content prematurely. The primary use case is integrating with Ethereum and EVM-compatible rollups via a smart contract, enabling projects to offer fair ordering and protection from predatory MEV strategies.

Key technical components include the Shutter DAO for governance, the Keyper Set managing the DKG process, and a punishment mechanism called slashing for malicious keypers. By making transaction intent opaque during the critical ordering phase, Shutter Network aims to create a credibly neutral and censorship-resistant environment. This is particularly vital for decentralized exchanges (DEXs), voting systems, and initial DEX offerings (IDOs), where transaction privacy directly impacts fairness and economic outcomes.

how-it-works
MECHANISM

How Shutter Network Works

Shutter Network is a decentralized key generation and threshold cryptography system designed to prevent front-running and censorship in decentralized applications by encrypting user transactions.

The core mechanism of Shutter Network is a Distributed Key Generation (DKG) protocol run by a decentralized set of operators known as keypers. These keypers collaboratively generate a shared public key for encryption and a corresponding set of secret key shares, with no single entity ever possessing the full private key. When a user submits a transaction to an application integrated with Shutter, it is encrypted with this public key, rendering its contents—such as bid amounts in an auction or trade details in a DEX—unreadable on the public blockchain.

This encrypted transaction enters a commitment phase, where it is broadcast to the network and included in a block, but its payload remains confidential. After a predefined block delay, the keypers run a threshold decryption process. A predetermined threshold of keypers (e.g., 2/3 of the committee) must contribute their secret shares to reconstruct the decryption key and reveal the original transaction data. The now-decrypted transaction is then executed on the destination application, such as a smart contract, in the same block, preventing any entity from front-running it based on prior knowledge.

The system's security and liveness rely on the economic security of the underlying Ethereum blockchain, as keypers are required to stake collateral and can be slashed for malicious behavior like refusing to participate in decryption. This architecture ensures cryptographic front-running protection and transaction privacy for the commitment period. Key technical components include the Shutterized smart contract wrapper, which manages the encryption/decryption lifecycle, and the keyper set, which can be dynamically updated via governance.

key-features
SHUTTER NETWORK

Key Features

Shutter Network is a decentralized key generation and threshold cryptography service designed to prevent frontrunning and malicious MEV in blockchain applications by encrypting sensitive data until a predefined condition is met.

01

Threshold Encryption

The core cryptographic primitive. Sensitive data (like a bid in an auction) is encrypted using a public key generated by a decentralized network of Keypers. The corresponding private key is secret-shared among these nodes using Distributed Key Generation (DKG). Decryption is only possible when a threshold of honest nodes collaborate, preventing any single entity from accessing the data prematurely.

02

Decentralized Key Generation (DKG)

The process by which the network's encryption key pair is created without a trusted dealer. A committee of Keyper nodes runs a protocol (e.g., GG20) to collectively generate a public key and distribute secret shares of the private key among themselves. This ensures trust minimization—no single node ever knows the full private key, and the system remains secure as long as the threshold of honest nodes is maintained.

03

Conditional Decryption & Time-Locks

Decryption is triggered by on-chain conditions, most commonly a block height. For example, in an on-chain auction, all bids are encrypted. The Shutter Network's Keypers are programmed to only collaborate to decrypt the messages once the bidding period, defined by a specific future block, has passed. This creates a commit-reveal scheme without requiring users to submit two transactions.

04

Frontrunning Prevention (MEV Mitigation)

A primary application. By encrypting transaction contents (e.g., DEX swaps, NFT bids) until they are included in a block, Shutter neutralizes sandwich attacks and other forms of malicious Maximal Extractable Value (MEV). Arbitrage bots cannot see the pending transaction details to frontrun them, leading to fairer and more predictable execution for users.

05

Keyper Node Network

The decentralized set of operators that run the threshold cryptography protocol. Keypers:

  • Run the DKG to establish encryption keys.
  • Hold secret shares of the private decryption key.
  • Monitor the blockchain for decryption triggers.
  • Collaborate to decrypt once conditions are met. They are typically staked and slashed for misbehavior, aligning incentives with network security.
06

Integration via Shutterized Contracts

The developer-facing interface. Smart contracts become "Shutterized" by integrating with a Key Broadcast Contract (KBC) and an Encryption Gateway. Users submit encrypted payloads to these contracts, which verify the encryption was performed with the network's current valid public key. This abstraction allows existing dApp logic to add encryption with minimal changes.

ecosystem-usage
SHUTTER NETWORK

Ecosystem Usage & Applications

Shutter Network is a decentralized threshold cryptography service that provides front-running protection and fair ordering for on-chain applications by encrypting critical data until a predetermined reveal point.

technical-details
TECHNICAL DETAILS & ARCHITECTURE

Shutter Network

A decentralized protocol designed to prevent frontrunning and malicious MEV (Maximal Extractable Value) in blockchain applications by using threshold cryptography to encrypt transactions before they are finalized.

The Shutter Network is a decentralized key generation (DKG) and threshold cryptography system that enables transaction encryption for smart contract platforms. Its core mechanism involves a distributed set of nodes, known as keypers, who collaboratively generate a public encryption key. Users submit their transactions encrypted with this key, making the transaction contents—such as the amount, recipient, or specific function call—unreadable to the public mempool and potential frontrunners. This encrypted state persists until a predefined future block, at which point the keypers use threshold decryption to reveal and execute the transactions simultaneously.

The architecture relies on a Keyper Set, a permissionless, dynamically changing committee elected through the native Shutter DAO. This set runs the Keyper Node software, which performs the Distributed Key Generation (DKG) ceremony to create a shared public key and individual secret key shares. For decryption, a predefined threshold of keypers (e.g., 2/3 of the committee) must collaborate to reconstruct the decryption key, ensuring liveness and robustness even if some nodes are offline or malicious. This process is managed by the Shutter Smart Contracts on the host chain (like Ethereum), which coordinate keyper sets and finalize the decryption results.

A primary application is encrypted mempools for decentralized exchanges (DEXs) and auction mechanisms. For example, in a sealed-bid auction or a DEX trade, users can submit encrypted orders that are only revealed and settled at the same time, eliminating the advantage for bots that scan the public mempool. This transforms potential malicious MEV—like frontrunning and sandwich attacks—into fair ordering, where transaction sequence is determined by the protocol rather than by gas price bidding wars after information leakage.

Integration with existing systems is achieved through Shutterized smart contracts. Developers can make their dApps MEV-resistant by modifying functions to accept encrypted inputs, which are only decrypted after a delay (e.g., 5-10 blocks). The network is chain-agnostic, operating as an overlay network that can be deployed on any Ethereum Virtual Machine (EVM)-compatible chain. Its security is rooted in the economic security of the underlying chain and the cryptographic security of the threshold Ethereum BLS signatures used by the keyper set.

The protocol's economic model involves the SHU token, used for governance within the Shutter DAO to manage the keyper set and protocol parameters. Keypers may be incentivized through rewards for participation, while a slashing mechanism can penalize malicious behavior, such as refusing to participate in required decryption rounds. This creates a cryptoeconomic system that aligns the network's operators with the goal of maintaining a secure, liveness-guaranteed encryption layer for the broader blockchain ecosystem.

security-considerations
SHUTTER NETWORK

Security Considerations & Trust Assumptions

Shutter Network is a decentralized key generation and threshold encryption service designed to mitigate front-running and censorship in blockchain applications by encrypting sensitive data, such as bids or votes, until a predefined reveal phase.

02

Threshold Cryptography & Trust Assumption

Shutter's security model is defined by a (t, n)-threshold scheme. For a network with n Keypers, the system remains secure as long as fewer than t nodes are malicious or Byzantine. For example, with a configuration of t=10 and n=30, the network tolerates up to 9 colluding or compromised nodes. The primary trust assumption is that this threshold of honesty among the decentralized Keyper set is maintained.

04

Encryption & Decryption Phases

  • Submission Phase: Users encrypt sensitive data (e.g., an auction bid) with the publicly known threshold public key.
  • Reveal Phase: After the event concludes, Keypers collaboratively produce decryption shares. Once a threshold of valid shares is collected, the ciphertext is decrypted on-chain.
  • Security Guarantee: Data remains confidential unless the threshold of Keypers colludes to decrypt it early, making front-running impossible for external actors.
05

Censorship Resistance vs. Liveness

Shutter provides strong censorship resistance for message submission, as anyone can encrypt and submit data. However, liveness—the guarantee that encrypted messages will eventually be decrypted—depends on the Keyper set. If more than n - t Keypers go offline or censor the reveal request, the system halts. This trade-off is fundamental to its asynchronous trust model.

06

Integration Risks & Relay Trust

Applications integrating Shutter (e.g., MEV-protected DEXs) often rely on a relayer to submit encrypted transactions to the base chain. Users must trust this relay not to censor their transactions, though it cannot read the contents. This introduces a weak trust assumption outside Shutter's core protocol. Some implementations use permissionless relay networks or force-inclusion lists to mitigate this.

PROTOCOL ARCHITECTURE

Comparison with Other MEV Mitigation Solutions

A technical comparison of key architectural and operational features across leading MEV mitigation approaches.

FeatureShutter NetworkFlashbots SUAVEThreshold Encryption (e.g., Drand)First-Come-First-Served (FCFS)

Core Mechanism

Distributed Key Generation (DKG) & Threshold Encryption

Centralized Auction & Order Flow Auction

Threshold Encryption (No DKG)

No Encryption

Decentralization of Key Management

Censorship Resistance

Requires Trusted Sequencer

Bid Transparency

Post-reveal

Opaque

Post-reveal

Public

Latency Overhead

~1-2 sec for decryption

< 1 sec

~1-2 sec for decryption

None

Integration Complexity

High (requires DKG setup)

Medium (relay integration)

Medium (encryption only)

Low

SHUTTER NETWORK

Frequently Asked Questions (FAQ)

Essential questions and answers about Shutter Network, a decentralized protocol designed to prevent frontrunning and malicious MEV in blockchain applications.

Shutter Network is a decentralized key generation (DKG) protocol that provides threshold encryption for transactions and messages on EVM-compatible blockchains. It works by distributing the power to encrypt and decrypt data across a network of keypers (keypers are nodes running the Shutter software). When a user submits a transaction, it is first encrypted using a public key generated by the keyper set. This encrypted transaction is included in a block, making its contents invisible to searchers, validators, and other users. Only after the block is finalized is the corresponding decryption key released by the keypers, revealing the transaction's details. This process, known as commit-reveal, prevents frontrunning and malicious Maximal Extractable Value (MEV) by hiding intent until it's too late to manipulate the transaction order.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Shutter Network: Encrypted Transactions & MEV Prevention | ChainScore Glossary