Current location - Quotes Website - Signature design - How to download the latest version of Bi 'an app officially?
How to download the latest version of Bi 'an app officially?
The rapid development of the blockchain industry benefits from the contribution of the open source community. The world's leading blockchain ecosystem currency security actively fulfills its open source commitment. Currency security is committed to contributing to the development of blockchain and ensuring the security of assets and information on blockchain such as currency security chain and bitcoin network. Therefore, the TSS solution of currency security is introduced, which has high security, can be quickly installed and signed, and is easy to retrieve under special circumstances, and has played an important role in the confidential documents of many companies.

Last month, the other shore further fulfilled the promise of open source, and announced the open source ECDSA (Elliptic Curve Digital Signature Algorithm) library based on threshold signature. The algorithm library will be managed by distributed key, so that the private key is no longer the most vulnerable part of wallet and asset custody.

The other side has invested a lot of development resources to realize TSS. As an encryption protocol for distributed key generation and signature, TSS can be compatible and reused in blockchain based on ECDSA, including coin security chain, bitcoin and Ethereum network. He Yi hopes that the developers of the other shore ecology will integrate this TSS library with their applications to further develop this exciting new technology.

How to interpret the threshold signature mechanism library of open source blockchain

For the blockchain threshold signature mechanism library, He Yi, the co-founder of the other shore, made the following interpretation: With this mechanism, three users can jointly manage a private key. Everyone only holds a part of the private key. If you want to sign a transaction, you need to integrate the signature data of at least two users to build a valid signature.

In this way, even if one of them has an accident, or the private key he manages is accidentally lost, don't be afraid. Two others have private keys. For individuals, threshold signature mechanism can help to manage private keys with multiple devices, so that a single damaged device will not pose risks to assets. For service operators, threshold signature mechanism can realize better access control strategy and prevent internal or external personnel from stealing company funds.

Main characteristics of TSS solution for currency security

High security: the private key will be divided into multiple private key segments and shared with multiple participants, and the private key will not be reconstructed during the signature transaction (such as transfer).

Quickly install signatures: It is more efficient than other schemes such as Multisig, because TSS has only 1 signatures instead of n signatures.

Guarantee to get it back: under special circumstances, you can get your private key back through the process of "enjoying again", that is, enjoying it again. The previous * * * enjoyment will be invalid.

How to use TSS in the currency security chain

TSS library has been used in currency security chain. Welcome to download the secure chain client supporting TSS to manage your private key safely.

The main steps of TSS:

Vault initialization: This step will establish an end-to-end encrypted communication channel to initialize all interested parties. For example, three parties need to participate.

Key generation: this step needs to determine the threshold strategy of the number of signers and enjoy the private key. For example, if the 2/3 strategy is adopted, it means that the private key will be divided into three private key segments, and any two of the three participants can sign the transaction.

Signature: Digital signatures are generated from their private keys, and the private keys will not be revealed.

Vault reorganization: If someone loses the private key of his safekeeping part, they need to share the private key again. Reorganization will produce new key fragments, and the previous fragments will be invalid.

The TSS solution for coin safety has simple installation steps, convenient operation and high safety. He Yi said that the TSS work in Bi 'an is not over yet. In the long run, Qian 'an hopes to open source and build a healthy and sustainable cryptographer community, which will not only benefit Qian 'an chain community, but also benefit the entire blockchain community. In the future, the other side plans to join hands with the other side chain community to provide TSS support for more advanced users.