Key Concepts and Techniques
Last updated
Last updated
The current version of OPZ utilizes two-party computation protocols, with the key shared between the User and OPZ server.
OPZ uses secure two-party computation, which enables two parties (user & OPZ server) to evaluate an arbitrary function f on their respective private inputs while revealing nothing but the result
Inputs: The user has a private input and the OPZ server has a private input .
Computation: A function is computed, where and are the domains of and respectively.
Output: The result of the computation is , where .
Instead of generating a key and then splitting it, an MPC protocol is used to generate the key shares. This ensures the key is never exposed on a single device, greatly reducing the risk of compromise.
Signing is crucial for securing transactions in our Multi-Party Computation (MPC) wallet. This process involves collaboration between the OPZ server and the user device.
We use two distinct MPC signing processes to adapt to the various requirements of different blockchains:
ECDSA (Elliptic Curve Digital Signature Algorithm):
Schnorr/EdDSA (Edwards-curve Digital Signature Algorithm):
By supporting these two key signing protocols, we provide a comprehensive solution adaptable to various blockchain environments.