当前位置:网站首页>How can I protect my private key?
How can I protect my private key?
2022-06-30 13:18:00 【Blockchain Star Club】
The blockchain uses asymmetric encryption to divide the user's key into private key and public key , The public key is published in the network , For data interaction and address access , The private key is kept in the user's hands , To protect your data and assets .
This kind of public 、 Private key separation , It is an encryption mechanism with high security coefficient . But in this mechanism , Similar to other encryption methods , Once the private key is stolen by others , Users' data and assets will be stolen . in fact , In the years of blockchain development , There are often network security problems caused by the loss of assets due to the disclosure of private keys . The hacker can not deduce the private key through the public key , You have chosen to directly steal the user's private key .

Why is the user's private key stolen ? Here we need to understand several popular private key protection methods :
firstly : Kept by the user
This usually means that the user passes the cold / The hot wallet manages its private key , There will be a set of private keys in the wallet . Cold wallet is offline in the whole process , It can be said that it has high security . And the hot wallet is due to the Internet , It is possible for hackers to intercept private key information .
however , Although the cold wallet is safer , However, the private key generated by the hash algorithm adopted by the blockchain during encryption is a long string of characters , Memory is relatively difficult , They usually use mnemonic words to help them remember , Users can also use notebooks 、 Memo and other tool records , These recording methods may lead to the loss of the private key .
second : Joint custody of multiple signatures
This safekeeping method uses smart contracts to sign transactions through multiple private keys before execution to improve security . Although the multi signature method makes the transaction more secure , But at the same time , It also creates new risks , That is, whether multiple signers holding private keys are fully trusted , If a signer has malicious behavior , Then assets will also face security threats .

third : Third party escrow
This is a scheme to store and manage the user's private key through a third-party organization , Third party organizations usually combine multiple signatures 、 Hardware security module (HSM) And other more professional protection measures to ensure the security of the private key .

however , There is also a premise , Users need to trust a third-party organization to protect the private key , And do not use user assets in secret .
From the above several ways of keeping private keys , There are some shortcomings more or less , These are the key vulnerabilities of hacker attacks .
After summing up the experience , The developer proposed a more secure protection method , It is called multiparty computation (MPC), This is a method to split the private key into multiple fragments , Share separately 、 The safekeeping method encrypted and sent to multi-party nodes .
The advantage of this approach is that , As long as the user doesn't use the wallet , Then the private key will always be separated . When hackers attack , Unless you completely break through all storage devices , Otherwise, the complete private key cannot be obtained . This undoubtedly reduces the risk of private key attack .
in addition ,MPC You can also do this without changing the private key , Update shared clips , It also avoids the risk of being cracked due to long-term existence in a device .
边栏推荐
- 60 个神级 VS Code 插件!!
- postman 自動生成 curl 代碼片段
- Hangzhou E-Commerce Research Institute: the official website (website) is the only form of private domain
- ERROR: Cannot uninstall ‘PyYAML‘. It is a distutils installed project and thus we cannot accurately
- Motor control Clarke( α/β) Derivation of equal amplitude transformation
- Qt中的事件处理
- Package tronapi wave field interface based on thinkphp5 PHP version -- interface document attached -20220627
- 你想要的异常知识点都在这里了
- Unity脚本的基础语法(4)-访问其他游戏对象
- elementui中清除tinymce富文本缓存
猜你喜欢
![[Select] resource realization information, news, we media, blog applet (can be drained, open traffic master, with PC background management)](/img/e7/1c34d8aa364b944688ec2ffb4feb7c.jpg)
[Select] resource realization information, news, we media, blog applet (can be drained, open traffic master, with PC background management)

WTM重大更新,多租户和单点登录

Qt中的数据库使用

一篇文章读懂关于企业IM的所有知识点

Wechat applet reports an error: typeerror: cannot read property 'SetData' of undefined

一条查询SQL是如何执行的

Determining the subject area of data warehouse construction

逆向调试入门-PE中的VA与RVA换算04/07

你想要的异常知识点都在这里了

Qt读写Excel--QXlsx工作表显示/隐藏状态设置4
随机推荐
Basic syntax of unity script (2) -record time in unity
Resource realization applet opening wechat official small store tutorial
PG Basics - logical structure management (table inheritance, partition table)
MySQL implements the division of two query results
Write, append, read, and copy of golang files: examples of using bufio packages
elementui中清除tinymce富文本缓存
华为帐号多端协同,打造美好互联生活
Sqlserver query code is 936 simplified Chinese GBK. Should I write 936 or GBK?
ffmpeg 杂项
Exploring the source code of Boca Cross Chain Communication: Elements
Basic syntax of unity script (3) - accessing game object components
postman 自動生成 curl 代碼片段
Kubeedge's core philosophy
SQL考勤统计月报表
排查问题的方法论(适用于任何多方合作中产生的问题排查)
60 个神级 VS Code 插件!!
rxjs Observable 两大类操作符简介
Terms related to JMeter performance test and performance test passing standards
论文解读(AGC)《Attributed Graph Clustering via Adaptive Graph Convolution》
【招聘(广州)】成功易(广州).Net Core中高级开发工程师