Key Concepts and Techniques

The current version of OPZ utilizes two-party computation protocols, with the key shared between the User and OPZ server.

Simple Example:

OPZ uses secure two-party computation, which enables two parties (user & OPZ server) to evaluate an arbitrary function f on their respective private inputs x,yx,y while revealing nothing but the result z=f(x,y)z=f(x,y)

  1. Inputs: The user has a private input xx and the OPZ server has a private input yy.

  2. Computation: A function ff is computed, where f:(X,Y)Zf:(X,Y)→ Z and X,Y,ZX,Y,Z are the domains of x,y,x,y, and zz respectively.

  3. Output: The result of the computation is zz, where z=f(x,y)z=f(x,y).


Two-Party Elliptic-Curve Mechanism

MPC Key Generation

Instead of generating a key and then splitting it, an MPC protocol is used to generate the key shares. This ensures the key is never exposed on a single device, greatly reducing the risk of compromise.

pageKey Generation

MPC Signing Process

Signing is crucial for securing transactions in our Multi-Party Computation (MPC) wallet. This process involves collaboration between the OPZ server and the user device.

We use two distinct MPC signing processes to adapt to the various requirements of different blockchains:

  1. ECDSA (Elliptic Curve Digital Signature Algorithm):

pageECDSA Signing Process
  1. Schnorr/EdDSA (Edwards-curve Digital Signature Algorithm):

pageSchnorr/EdDSA Signing

By supporting these two key signing protocols, we provide a comprehensive solution adaptable to various blockchain environments.

Last updated