# Key Concepts and Techniques

The current version of OPZ utilizes two-party computation protocols, with the key shared between the User and OPZ server.

## Simple Example:

OPZ uses secure two-party computation, which enables two parties (user & OPZ server) to evaluate an arbitrary function f on their respective private inputs $x,y$ while revealing nothing but the result $z=f(x,y)$

**Inputs**: The user has a private input $x$ and the OPZ server has a private input $y$.**Computation**: A function $f$ is computed, where $f:(X,Y)→ Z$ and $X,Y,Z$ are the domains of $x,y,$ and $z$ respectively.**Output**: The result of the computation is $z$, where $z=f(x,y)$.

## Two-Party Elliptic-Curve **Mechanism**

**Mechanism**

### MPC Key Generation

Instead of generating a key and then splitting it, an MPC protocol is used to generate the key shares. This ensures the key is never exposed on a single device, greatly reducing the risk of compromise.

Key Generation### MPC Signing Process

Signing is crucial for securing transactions in our Multi-Party Computation (MPC) wallet. This process involves collaboration between the OPZ server and the user device.

We use two distinct MPC signing processes to adapt to the various requirements of different blockchains:

**ECDSA (Elliptic Curve Digital Signature Algorithm)**:

**Schnorr/EdDSA (Edwards-curve Digital Signature Algorithm)**:

By supporting these two key signing protocols, we provide a comprehensive solution adaptable to various blockchain environments.

Last updated