Key Concepts and Techniques
The current version of OPZ utilizes two-party computation protocols, with the key shared between the User and OPZ server.
Simple Example:
OPZ uses secure two-party computation, which enables two parties (user & OPZ server) to evaluate an arbitrary function f on their respective private inputs while revealing nothing but the result
Inputs: The user has a private input and the OPZ server has a private input .
Computation: A function is computed, where and are the domains of and respectively.
Output: The result of the computation is , where .
Two-Party Elliptic-Curve Mechanism
MPC Key Generation
Instead of generating a key and then splitting it, an MPC protocol is used to generate the key shares. This ensures the key is never exposed on a single device, greatly reducing the risk of compromise.
Key GenerationMPC Signing Process
Signing is crucial for securing transactions in our Multi-Party Computation (MPC) wallet. This process involves collaboration between the OPZ server and the user device.
We use two distinct MPC signing processes to adapt to the various requirements of different blockchains:
ECDSA (Elliptic Curve Digital Signature Algorithm):
Schnorr/EdDSA (Edwards-curve Digital Signature Algorithm):
By supporting these two key signing protocols, we provide a comprehensive solution adaptable to various blockchain environments.
Last updated