iOS Encryption & Backup Strategy

Storage Options, Multi-Device Coordination, and Redundancy Logic

1. iOS Encryption Storage Options

iOS provides multiple mechanisms for securely storing cryptographic material. Each offers different trade-offs between security, accessibility, and recoverability.

HIGHEST

Secure Enclave

What: Hardware-isolated cryptographic processor on A-series chips.

Security: Private keys never leave the enclave. Operations performed in isolation.

Use: Master keys, signing operations, MPC party shares.

Trade-off: Limited key count (~32 keys). Cannot backup or export.

CLOUD-BACKED

iCloud Keychain

What: Encrypted sync across Apple devices (iPhone, iPad, Mac).

Security: AES-256 encryption, each device has its own encryption key.

Use: Non-critical keys, recovery codes, backups.

Trade-off: Requires iCloud account. Keys at rest in Apple's cloud. Device loss triggers sync delays.

ON-DEVICE

Filesystem Encryption (Data Protection)

What: App sandbox with file-level encryption.

Security: Class-based protection: Complete, Protected, or Protected Unless Open.

Use: Share data, temporary keys, recovery workflows.

Trade-off: Local-only. Lost if device is reset. Backed up to iCloud or encrypted backups.

BACKUP

iTunes/Finder Encrypted Backup

What: Local encrypted backup to computer (Desktop/Laptop).

Security: Optional password protection, stored on trusted computer.

Use: Offline backup of Keychain and sensitive data.

Trade-off: Requires manual setup. Only as secure as the backup computer.

Storage Security Hierarchy

1. Secure Enclave: No backup, maximum isolation. For master keys only.

2. iCloud Keychain: Encrypted cloud sync. For recovery and secondary keys.

3. Filesystem (Protected): Device-local encryption. For MPC party shares.

4. Encrypted Backup: External storage. For disaster recovery.

2. Multi-Device Joining via Bluetooth

iOS devices can coordinate cryptographic operations via Bluetooth using the MultipeerConnectivity framework (peer-to-peer) or via a commitment server (network-coordinated).

2.1 Peer-to-Peer (Bluetooth Direct)

Device A: Advertise
Device B: Discover
Exchange MPC Shares
Advantages

✓ No server required

✓ Fast (Bluetooth range ~100m)

✓ Direct peer-to-peer trust

Limitations

✗ Proximity required

✗ Both devices online simultaneously

✗ No transaction history

Best For

Co-located device setup

Initial 2-party DKG ceremony

Emergency recovery (nearby devices)

2.2 Commitment Server (Network Relay)

Device A
Commitment Server
Device B
Advantages

✓ Devices don't need proximity

✓ Asynchronous messaging

✓ Audit trail available

Limitations

✗ Server can observe metadata

✗ Server downtime = blocked signing

✗ Requires server deployment

Best For

Distributed multi-device setup

Continuous signing operations

Cloud-backed MPC

3. Commitment Server as Party 1

In a 2-party MPC scheme, the commitment server acts as Party 1, with the iOS device as Party 2. The server is "committed" because it cannot collude with the device without revealing the scheme.

Server Role in 2-Party MPC

Party 1 (Server):

Party 2 (iOS Device):

Trust Model: Server and device are honest-but-curious. Neither can forge a signature alone. Both must be compromised to steal the key.

4. USB-C Backup & Disaster Recovery

For maximum redundancy, MPC shares can be backed up to external USB-C storage or via iCloud. The following strategies balance convenience with security.

2-Party MPC with USB-C Backup Options
Option A
Phone (Party 2)
+ USB Backup #2
Server
(Party 1)
Primary Location
Option B
iCloud Keychain
(Encrypted Sync)

Option A (Highest Redundancy): Party 2 share on device AND on encrypted USB. If phone is lost, recover from USB.
Option B (iCloud Sync): Party 2 share syncs to other devices via Keychain. Seamless multi-device access.
Combined (Recommended): Party 2 on Secure Enclave + USB backup + iCloud Keychain for redundancy across 3 locations.

4.1 USB-C Encrypted Container

Device: iPhone 15 Pro Storage: USB-C drive or encrypted external SSD Format: APFS (encrypted), FAT32 (encrypted via app) Backup Contents: ├── share_party2.enc (encrypted Party 2 share) ├── share_party2.bak (encrypted backup copy) ├── metadata.json (threshold, party info) └── recovery_codes.txt (hardcopy printout)
USB Backup Caution

USB drives can be lost, stolen, or corrupted. Always pair USB backup with either iCloud Keychain sync OR a second USB drive stored separately. Never rely on a single USB as the only backup.

5. 2-Party Key Generation Workflow

When generating keys for 2-party MPC, the user configures where each party's share is stored and how backups are handled.

Setup 2-Party MPC
Configuration
Party 1 Server
api.example.com
Setup
Backup Strategy
Party 2 Share Location

Select all that apply for redundancy

Backup
Confirm Defaults
Recommended Setup
Party 2 (Your Device)
Secure Enclave: ✓
iCloud Keychain: ✓
USB Backup: Optional
Party 1 (Server)
Location: api.example.com
HTTPS: ✓
Confirm

5.1 Default Settings (Recommended)

Party 2 (Device)

☑ Secure Enclave (primary)

☑ iCloud Keychain (backup)

○ USB-C (optional emergency)

Party 1 (Server)

☑ Commitment Server

☑ HTTPS/TLS

☑ Audit Logging

User Options

☐ Enable USB backup

☐ Auto-sync to iCloud

☐ Require biometric for signing

6. N-Party Threshold Schemes with Backup Logic

For distributed setups with 3+ parties, each holding a share of an encryption key, we can combine AND/OR logic to create flexible redundancy strategies.

6.1 Credible Minimum: 2-of-3 Setup

Definition: Credible Minimum

Credible Minimum: The smallest threshold where no single party can unilaterally sign or reveal the secret. In 2-of-3, you need ANY 2 out of 3 parties to recover.

Distribution:

Recovery Scenarios:

6.2 AND/OR Logic for Backup Combinations

Strategy Logic Redundancy Recovery Single Device Part A only None Phone lost → key lost AND (2 Required) Part A AND Part B 1 loss tolerated Both needed; 1 loss = unrecoverable OR (2-of-3) (A AND B) OR (A AND C) OR (B AND C) 1 loss tolerated Any 2 parts recovers full secret OR (2-of-4) Any 2 of {A, B, C, D} 2 losses tolerated More resilient; requires more storage

6.3 Recommended N-Party Topologies

Topology Options for 2-of-3 Sharing
Topology 1: Physical + Digital (RECOMMENDED)
Part A
iPhone Secure Enclave
(Always with you)
Part B
USB-C (Home Safe)
(Physical backup)
Part C
iCloud Keychain
(Cloud backup)

Combine portable (A) + physical (B) + cloud (C). Tolerates any 1 loss. Recommended for most users.

Topology 2: Maximum Redundancy
Part A
iPhone Secure Enclave
Part B
USB-C (Home Safe)
Part C
USB-C (Separate Location)
Part D
iCloud Keychain

2-of-4 scheme. Tolerates 2 losses. Highest security for institutional use.

7. iPhone Backup vs. N-Party Strategies

Comparison: Device Backup vs. Distributed Shares
Aspect iPhone iCloud Backup 2-of-3 MPC Shares USB + iCloud Hybrid
Restore Time Minutes (cloud sync) Minutes (reconstruct) Minutes (hybrid)
Loss Tolerance Depends on iCloud account Lose 1 part, recover with 2 Tolerate 1-2 losses
Single Point of Failure iCloud account compromise No single point (distributed) No single point (distributed)
Offline Recovery Requires internet Air-gapped (fully offline) Air-gapped (fully offline)
Best For Day-to-day recovery Cold storage vault Optimal: both strategies

Recommendation: Use iCloud backup for convenience and 2-of-3 MPC shares for security redundancy. Both can coexist: iCloud for daily recovery, USB-C shares for emergency vault storage.

8. User Configuration Decision Tree

When setting up MPC on iOS, the app presents a series of options leading to a recommended configuration. Below is the decision tree.

Quick Setup: 3 Questions
Q1: How critical is this key?
A. Daily signing (low risk) → Default: Secure Enclave only
B. Large transactions (medium risk) → Default: Secure Enclave + iCloud
C. Vault key (high risk) → Default: 2-of-3 with USB backups
Q2: Do you have USB storage available?
A. No → Use iCloud Keychain sync (convenient, cloud-backed)
B. Yes (1 USB) → Backup to USB + iCloud for redundancy
C. Yes (2+ USB) → 2-of-3 scheme (phone + USB #1 + USB #2)
Q3: Multi-device sync needed?
A. Single iPhone → Store on phone only
B. iPhone + iPad → Use iCloud Keychain for sync
C. iPhone + commitment server → Use server-coordinated 2-party MPC

The user's answers determine whether to recommend Secure Enclave only, iCloud sync, USB backup, or full 2-of-3 distributed scheme.

Pro Configuration (Recommended for Most)

Party 2 Share: Secure Enclave (primary) + iCloud Keychain (sync) + USB-C (optional emergency)

Party 1 Server: Commitment server with HTTPS and audit logging

Signing: Require biometric (Face ID/Touch ID) + server authentication

Recovery: Reconstruct via iCloud + USB if phone lost; reconstruct via server + USB if both devices compromised