当前位置:网站首页>How can I protect my private key?
How can I protect my private key?
2022-06-30 13:18:00 【Blockchain Star Club】
The blockchain uses asymmetric encryption to divide the user's key into private key and public key , The public key is published in the network , For data interaction and address access , The private key is kept in the user's hands , To protect your data and assets .
This kind of public 、 Private key separation , It is an encryption mechanism with high security coefficient . But in this mechanism , Similar to other encryption methods , Once the private key is stolen by others , Users' data and assets will be stolen . in fact , In the years of blockchain development , There are often network security problems caused by the loss of assets due to the disclosure of private keys . The hacker can not deduce the private key through the public key , You have chosen to directly steal the user's private key .

Why is the user's private key stolen ? Here we need to understand several popular private key protection methods :
firstly : Kept by the user
This usually means that the user passes the cold / The hot wallet manages its private key , There will be a set of private keys in the wallet . Cold wallet is offline in the whole process , It can be said that it has high security . And the hot wallet is due to the Internet , It is possible for hackers to intercept private key information .
however , Although the cold wallet is safer , However, the private key generated by the hash algorithm adopted by the blockchain during encryption is a long string of characters , Memory is relatively difficult , They usually use mnemonic words to help them remember , Users can also use notebooks 、 Memo and other tool records , These recording methods may lead to the loss of the private key .
second : Joint custody of multiple signatures
This safekeeping method uses smart contracts to sign transactions through multiple private keys before execution to improve security . Although the multi signature method makes the transaction more secure , But at the same time , It also creates new risks , That is, whether multiple signers holding private keys are fully trusted , If a signer has malicious behavior , Then assets will also face security threats .

third : Third party escrow
This is a scheme to store and manage the user's private key through a third-party organization , Third party organizations usually combine multiple signatures 、 Hardware security module (HSM) And other more professional protection measures to ensure the security of the private key .

however , There is also a premise , Users need to trust a third-party organization to protect the private key , And do not use user assets in secret .
From the above several ways of keeping private keys , There are some shortcomings more or less , These are the key vulnerabilities of hacker attacks .
After summing up the experience , The developer proposed a more secure protection method , It is called multiparty computation (MPC), This is a method to split the private key into multiple fragments , Share separately 、 The safekeeping method encrypted and sent to multi-party nodes .
The advantage of this approach is that , As long as the user doesn't use the wallet , Then the private key will always be separated . When hackers attack , Unless you completely break through all storage devices , Otherwise, the complete private key cannot be obtained . This undoubtedly reduces the risk of private key attack .
in addition ,MPC You can also do this without changing the private key , Update shared clips , It also avoids the risk of being cracked due to long-term existence in a device .
边栏推荐
- WTM major updates, multi tenancy and single sign on
- [deep anatomy of C language] storage principle of float variable in memory & comparison between pointer variable and "zero value"
- 波卡跨链通信源码探秘: 要素篇
- Kaniko official documents - build images in kubernetes
- Golang Basics - string and int, Int64 inter conversion
- Mqtt ROS simulates publishing a custom message type
- 机器学习笔记 - 自相关和偏自相关简介
- ABAP工具箱 V1.0(附实现思路)
- [one day learning awk] Fundamentals
- JS method of changing two-dimensional array to one-dimensional array
猜你喜欢

Resource realization applet opening wechat official small store tutorial

A keepalived high availability accident made me learn it again!

All the abnormal knowledge you want is here

杭州电子商务研究院:官网(网站)是私域的唯一形态

Dark horse notes - collection (common methods and traversal methods of collection)

WTM重大更新,多租户和单点登录
![[one day learning awk] use of built-in variables](/img/5b/bc1b91804e03dcfd3fe7eae8084eb4.png)
[one day learning awk] use of built-in variables

华为帐号多端协同,打造美好互联生活

Hangzhou E-Commerce Research Institute: the official website (website) is the only form of private domain

Idea 2021.3 golang error: rning: undefined behavior version of delve is too old for go version 1.18
随机推荐
发生QQ大规模盗号事件,暴露出什么网络安全问题?
微信小程序报错:TypeError: Cannot read property ‘setData‘ of undefined
Exploring the source code of Boca Cross Chain Communication: Elements
golang文件的写入、追加、读取、复制操作:bufio包的使用示例
防火墙基础之总部双机热备与分支基础配置
Flink SQL console, group not recognized_ Concat function?
[yitianxue awk] regular matching
【招聘(广州)】成功易(广州).Net Core中高级开发工程师
Paper interpretation (AGC) attributed graph clustering via adaptive graph revolution
RK356x U-Boot研究所(命令篇)3.2 help命令的用法
[one day learning awk] array usage
Kubeedge's core philosophy
Product manager professional knowledge 50 (7) - how to establish a complete set of user growth system?
一条查询SQL是如何执行的
Js根据相同值将数组转换为二维数组
机器学习笔记 - 自相关和偏自相关简介
golang基础 —— 切片和数组的区别
golang基础 —— 切片几种声明方式
独立站即web3.0,国家“十四五“规划要求企业建数字化网站!
postman 自動生成 curl 代碼片段