Blog

What are hierarchical deterministic (HD) wallets?

Resources
·
December 17, 2025
·
Bryce Ferguson, Co-Founder & CEO of Turnkey

Hierarchical deterministic (HD) wallets are a wallet structure that derives many cryptographic key pairs from a single root seed in a predictable, reproducible way.

HD wallets were created in 2012 when Bitcoin developer Pieter Wuille introduced BIP-32 to solve a growing key management problem. In early wallet designs, every new address was backed by a newly generated private key, meaning wallets accumulated independent keys over time and required frequent backups to avoid losing access to funds. 

BIP-32 introduced a deterministic, hierarchical key structure where all keys are derived from a single seed (commonly represented as a seed phrase), allowing wallets to generate unlimited addresses while requiring only one backup.

This model quickly became the foundation for modern wallet design. Modern blockchain applications rarely operate with a single address. Trading systems, embedded wallets, payment flows, and automated agents all depend on managing large numbers of cryptographic keys that must remain secure, organized, and recoverable as systems grow.

How HD wallets derive multiple keys from one seed

HD wallets organize derived keys into a tree-like structure. Each node in the tree represents a key that can, in turn, derive additional child keys. 

This hierarchy allows wallets to group keys logically by account, purpose, or blockchain network while still maintaining a single underlying secret. New keys can be generated at any time without requiring fresh entropy or additional backups.

The derivation process is deterministic. Given the same seed and the same derivation path, the resulting keys will always be identical. This means wallet software does not need to store every private key it generates. Instead, it only needs to store the seed and the paths used to derive keys.

This deterministic structure also enables safer system design. Because keys are derived rather than randomly generated, applications can predictably generate new addresses without risking collisions or loss. The result is a wallet architecture that scales cleanly as the number of accounts and transactions grows.

Understanding derivation paths and wallet hierarchy

Rather than generating keys randomly, the wallet follows an explicit path from the root seed through a sequence of parent and child nodes, with each step producing a deterministic key.

These paths are written in a standardized, human-readable format. They encode both structure and intent, specifying which branch of the tree should be used for a given account, purpose, or address type.

This hierarchical approach allows wallets to organize keys under a single root seed while maintaining strict separation between accounts. Different branches of the tree can safely represent different blockchains, accounts, or address formats without collisions.

For example, HD wallets can generate keys for multiple blockchains from the same seed. Ethereum, Bitcoin, Solana, and other networks can all be supported through different path conventions. A single seed can securely back many networks without key reuse or confusion. 

Because derivation paths are flexible, they can also be used to enforce logical boundaries within an application. One path might be reserved for user-facing accounts, another for automated processes, and another for internal treasury operations. This makes derivation paths a powerful organizational tool, not just a technical detail, in scalable wallet architecture.

How HD wallets scale for developers, users, and applications

For developers, HD wallets enable predictable account generation and structured key organization. New accounts can be created on demand without introducing additional backup requirements or operational risk. 

Because derivation follows explicit paths, keys can be grouped logically by purpose, user, or system role, making automation safer and easier to reason about.

HD wallets also simplify key management by reducing the number of secrets that must be stored and protected. Rather than backing up and securing large collections of unrelated private keys, systems only need to protect a single root seed. 

If that seed is preserved, the entire wallet can be reconstructed deterministically, including every derived account and address. This makes backup and recovery far more reliable than traditional key-by-key wallet designs. 

Real-world usage of HD wallets

Most developers and users already interact with HD wallets daily, often without realizing it. Popular wallets like MetaMask and Phantom rely on HD wallet designs under the hood. When a user creates multiple accounts, each account is typically derived from the same underlying seed rather than backed by a completely new secret.

The same principles apply to programmatic and enterprise wallet systems, where HD wallets allow applications to generate large numbers of addresses while maintaining a simple and reliable recovery model.

HD wallets are particularly useful when many distinct accounts must exist under a single logical owner. This can include:

  • Individual users

  • Applications or environments

  • Backend services

  • Automated agents or trading bots

By assigning different derivation paths, systems can cleanly isolate accounts while keeping them linked to a single root seed. One branch of the tree might be reserved for user-facing wallets, another for internal operations, and another for automated workflows. This structure preserves strong cryptographic isolation while avoiding key sprawl.

Injective Labs Statement

Per-user wallets vs shared derivation models

A critical architectural decision is whether each user should have their own wallet root or share a derivation structure.

In non-custodial systems, each user should almost always have their own wallet root. This ensures users retain independent control, clear ownership boundaries, and the ability to recover their wallet without relying on a shared system.

In custodial systems, there are typically two viable approaches:

  • Per-user wallet roots, which are often preferred if a future transition to non-custodial is anticipated

  • A shared master HD wallet, where individual user keys and addresses are derived using structured derivation paths

The shared derivation approach can simplify operations while still maintaining strong isolation at the key level. Importantly, HD wallets support both models without changing the underlying cryptographic assumptions.

By combining deterministic key derivation with hierarchical organization, HD wallets allow systems to grow safely without increasing operational risk. This flexibility is what makes them suitable for everything from consumer wallets to enterprise-grade blockchain applications.

How Turnkey uses HD wallets in its architecture

Turnkey builds on standard HD wallet principles to support scalable organizations and sub-organizations without introducing key sprawl or operational complexity. 

Rather than treating each wallet as an isolated keypair, Turnkey uses HD wallets to allow many wallet accounts to exist under a single organizational structure, all derived deterministically from a small number of root seeds.

Each organization or sub-organization can create up to 100 HD wallets. Each HD wallet is backed by a single seed and can generate an unlimited number of wallet accounts through deterministic derivation paths.

This allows developers to create large numbers of wallets for users, services, or automated systems without increasing backup surface area or secret management overhead. As long as the seed and derivation paths are preserved, every derived wallet can be recreated reliably.

This approach is especially important for applications that need to scale quickly or operate across multiple chains and environments. HD wallets provide the mathematical foundation that allows Turnkey to generate wallets dynamically while keeping recovery, auditability, and operational safety intact.

HD wallets and organizational boundaries in Turnkey

HD wallets map cleanly onto Turnkey’s organization and sub-organization model, making it easier to enforce logical and security boundaries without changing how keys are derived. Organizations and sub-organizations act as clear ownership and access control domains, while HD wallets handle scalable key generation within those boundaries.

This structure allows developers to separate users, environments, or applications in a way that aligns with how their systems are built. 

One sub-organization might represent a single end user, another might represent a backend service, and another might represent a specific environment, such as staging or production. All of these can rely on the same HD wallet mechanics while remaining cryptographically isolated.

Developers can either give each user their own sub-organization and wallet, or manage many user wallets together by deriving them from shared HD wallets inside one organization or sub-organization.

Because the underlying HD wallet mechanics are the same, teams can evolve their architecture over time without rethinking how wallets are generated or secured.

What are organizations and sub-organizations in Turnkey?

Organizations are the top-level security and ownership boundary in Turnkey. An organization represents a single application, company, or system and defines who can create wallets, request signatures, and manage policies.

Sub-organizations are isolated child entities within an organization. Each sub-organization has its own wallets, users, and policies, while still inheriting the same underlying security model. This makes sub-orgs ideal for representing individual end users, environments, or services without sharing signing authority.

Together, organizations and sub-organizations give developers a clean way to model ownership, access control, and wallet isolation at scale, while HD wallets handle deterministic key generation inside those boundaries.

To see how sub-orgs, resources, and policies work together in practice, read the guide on creating sub-organizations and enforcing policies on Turnkey.

Why HD wallets are foundational for scalable wallet infrastructure

HD wallets are not just a convenience or an implementation detail. They are a structural requirement for any system that needs to manage large numbers of cryptographic keys safely, reliably, and at scale. As applications grow across users, chains, and automated workflows, ad hoc key generation and manual backup models quickly break down.

By combining deterministic key derivation with hierarchical organization and strong cryptographic guarantees, HD wallets make it possible to generate, organize, and recover wallets predictably over time. They reduce operational risk, simplify recovery, and provide a clear framework for separating accounts and responsibilities without introducing key sprawl.

This foundation is what enables modern wallet infrastructure to scale safely. Platforms like Turnkey build on HD wallets to support complex, high-volume blockchain applications, where secure automation, clear ownership boundaries, and reliable recovery are not optional, but essential.

Get started with Turnkey today. 

Related articles