Overview
Hedera-native developers can leverage Hedera’s advanced account and key management features, including ED25519 accounts, multi-sig configurations, and threshold keys. To integrate seamlessly with EVM-compatible chains and applications, you’ll need to work with ECDSA key pairs. Hedera’s HIP-632 system contract functions—isAuthorized
and isAuthorizedRaw—bridge
this gap by enabling on-chain verification of both ED25519 and ECDSA signatures. This ensures you can extend
Hedera-native security features into EVM-compatible smart contracts without compromising trust boundaries or
functionality.
Bridging ED25519 Accounts with Solidity
Hedera’s ED25519 accounts are incompatible with Solidity’sECRECOVER
function, which supports ECDSA. To enable seamless integration, HIP-632 introduces two key system contract
functions:
isAuthorizedRaw: Validates a single raw ED25519 signature.isAuthorized: Validates multiple signatures or threshold key configurations, supporting multi-sig and advanced key schemes.
isAuthorizedRaw)
to verify a raw signature on-chain.
Integrating Multi-Sig and Threshold Keys On-Chain
Hedera’s account model supports multi-sig and threshold key configurations. You can replicate these models on-chain withisAuthorized
for robust access control.
Example: On-Chain Multi-Sig Verification
This example demonstrates requiring multiple valid signatures for critical contract actions:
Supporting Dynamic Key Rotation
Hedera’s dynamic key rotation allows you to update an account’s keys without changing its alias. By integratingisAuthorized
checks into your contracts, your on-chain logic automatically remains in sync with the current authorized keys.
Even as keys change over time to improve security or operational flexibility, your contracts don’t need to be
redeployed or modified—isAuthorized
will always reflect the latest configuration.