Original: Five Fireball Leaders
Source: Vernacular Blockchain
Cryptocurrencies such as bitcoin must continuously improve their security to face many challenges in future technological development. In the previous article "Can it be like a WeChat wallet? The important evolution direction of digital wallet technology in 2020 (Part 1) ", we introduced the breakthrough in ease of use of wallets in 2020, namely-smart contract wallets. No mnemonic is needed in terms of friendliness. In case of loss of the key, it can be retrieved using a friend like WeChat.
- Smart contract backdoor unveiled: It's not just hackers who steal money, the "one-click coin" platform has hidden backdoors
- "Chengdu Chainan" Receives New Round of Financing from Qianhai Mother Fund, Yang Xia, Founder of Babbitt Exclusive Dialogue
- TronBank 200 million BTT Quilt: "Counterfeit Currency" Attack Analysis
- The data shows that there were 11 security incidents in August and the digital currency worth over 60 million was stolen.
- Windows Defender is found to be a security bug, and encrypted users may be at risk
- Difficulties and Solutions to Blockchain Security in Accidents
Through smart contract escrow, many functions and usages can be exhibited. Presumably, the To C market in the next 1-2 years will definitely make a big difference.
What I want to introduce today is the breakthrough in security and professionalism of the cryptocurrency wallet in 2020. I believe that in the upcoming field of blockchain landing, it will firmly occupy a certain To B market share.
01 To B demand for crypto wallets
Imagine that now it is 2030, the blockchain has a very good landing application. As a CEO of a blockchain or a blockchain technology company, your company's wallet stores hundreds of millions or even tens of thousands of dollars. A billion dollar cryptocurrency.
At this time, you must not consider the factors of ease of use and convenience, and you are unlikely to trust these funds to smart contracts. What you think in your mind must be " safe, secure, safe ."
Security here is not just a mnemonic, private key, or a hardware wallet isolated from the network. After all, mnemonics are easy to lose, private keys are easy to leak, and hardware is easily damaged.
Furthermore, you have to trust the financial people in your company who manage the private keys, unless you want to keep all the private keys and mnemonics in your possession.
Is there any good solution?
The secret is all in signature technology.
02 signature technology
1. Multisig (Multisig for short)
Remember the nuclear button in Hollywood movies?
Many people thought that if they wanted to launch a nuclear bomb, it was as if the President of the United States opened the suitcase, inserted the key, and patted the red button.
Later, Hollywood movies helped them correct this concept. After all, this is something that can destroy the earth. How can it be played like this? In addition to the extremely tedious command confirmation procedures and steps, if you want to launch a nuclear bomb, the nuclear bomb control panel is only effective when two keys are inserted and screwed at the same time. The two keys are in the hands of two different people, the Secretary of Defense and the President.
It's like, on an overly important safe, two locks are designed and the keys are distributed to different people. Only two people appear at the same time with their keys, and the safe can be opened.
Multi-signature in the blockchain world is similar, usually used for large assets. Multi-signature usually has N private keys, and M (M <N) signatures must be collected to operate the asset. Different private keys are in the hands of different people. So even if some private keys are stolen or lost, assets are still safe.
The million BTC Tulip Trust claimed by CSW is a trust locked by multiple signings. Of course, if it exists.
Second, the multi-signature upgrade-Secret Sharing Scheme (SSS)
Although multiple signing sounds good, the disadvantages are also very obvious.
1. Ease of use-Multi-signature transaction data is 20% -60% larger than ordinary transactions, resulting in relatively high transaction fees and inability to handle large-volume online businesses.
2. Privacy-Multi-signature is to store the signatures of each signatory in the blockchain record in the form of on-chain broadcast. The correspondence between signatures and addresses and the number of signatures are equivalent to being published, and theoretically can be tracked by interested people To understand the relationship between the address and the business, the privacy of the transaction is not protected.
Thus, there is an improved key sharing model.
Key sharing is similar to multi-signature, except that instead of designing N locks on the safe, there is still only one lock and one key, but the key is cut into several copies, and each person saves one. Initiating a transaction requires reassembling a certain number of keys into a key for signing.
In simple terms, you understand key sharing as a cut treasure map, or dragon ball, gather seven dragon balls, summon the dragon …
The benefits of doing this are obvious. While retaining the advantages of multi-signature, the transaction data in multi-signature is large, the cost is high, and the shortcomings of privacy are gone. It sounds like a perfect solution …
However, SSS has a fatal drawback: when the key is reassembled, it provides an attacker with the opportunity to obtain the full key, leaving no small security risks.
As a result, there is now an upgraded version of secret sharing.
Third, key sharing upgrade-Threshold signatures
Threshold signature is similar to key sharing. The difference is that key sharing is that each sub-key needs to be assembled into a complete key before it can be used. Therefore, there is a risk that the complete key is exposed and stolen.
The principle of threshold signature is based on multi-party secure computing (MPC: Multi-Party Computation). Each subkey has a certain algebraic structure. When in use, each subkey performs a (transaction) signature in turn to generate a final valid signature. The full key does not need to be assembled, so there is no "exposure time" for the full key, which makes the attacker "multiplyable".
You see, while the threshold signature retains the advantages of key sharing, it also mathematically eliminates the disadvantage of the key contribution that exposes the full key. This is why in 2019, many wallets have plans to upgrade the threshold signature technology.
At present, there are already several preliminary available products. In order to avoid suspicion of advertising, please search by yourself. I believe that in 2020, you will definitely see more wallets based on threshold signature technology now in our field of vision.
03 written in the final off topic
Finally, a digression is about the Schnoor aggregate signature used in the BCH 19-year upgrade and will most likely be deployed on BTC in 2020. Because this signature technology is currently dedicated to BTC and BCH, it is not included in the previous chapter. speak.
As we all know, Bitcoin is the earliest generation of digital currency. Although the address can be generated at will, its anonymity is not strong. Later anonymity technologies such as ring signatures, bulletproof technology, ZkSNARKS, and this year's hot MimbleWimble, although there have been more mature applications, but if transplanted to the underlying protocol of Bitcoin, it will affect the entire Bitcoin framework Making major changes, and at the same time bringing a lot of risks, as the Core development group that does not like hard forks, these are not used as an alternative to the anonymous protocol of Bitcoin.
The Schnoor aggregate signature technology that has been implemented on BCH has recently been put on the BTC development proposal, and it is likely to be deployed on BTC. In simple terms, Schnoor is a special multi-signature technology.By combining the public keys and signatures of the parties in a multi-signature transaction into a single public key and signature, the merge process is not visible, and the merged public The key and signature are used to derive the information before the merge.
The benefits of this are: first, the performance is better. Traditional multi-signature requires multiple verifications of multiple signatures, and aggregate signatures need to be verified only once. This improves the verification speed and reduces the size of the signature and transaction volume.
The second is to provide privacy, because for the verifier, the aggregated signature has only one merged signature, and the previous parties' signatures cannot be deduced in reverse. The overall feeling is a bit like Dash's mixed coin.
However, the BSVs of the three Bitcoin brothers insist on threshold signatures for reasons that are not technical. Technically speaking, threshold signature and Schnoor are both excellent, taking into account performance, security, and to a certain degree of privacy. The main differences are the threshold signature and Schnoor's different concepts of privacy, and legal compliance and traceability.
Schnoor aggregated signatures, and could not trace who signed it at the time. It was a bit like a collective secret ballot. Finally, a public seal was issued, which is difficult to trace back to individuals. It has the nature of privacy + anonymity.
Threshold signature is a bit like a registered majority vote. It can be traced back to individuals and belongs to privacy. However, it does not have anonymity and has the nature of a collective contract.
From the choice of signature technology, it can also be seen that the morphology is different-BTC and BCH, the idea is to take the anonymity, anti-censorship, and hard-to-trace password punk route. With BSV, the philosophy is to be legally compliant, private but not anonymous, and traceable to business promotion routes.
Good or bad, it is difficult to say. It is more a matter of market choice. I believe that we should be able to see the answer around the next production reduction (2024).
In 2020, in the cryptocurrency industry, which technology or application breakthroughs are you optimistic about? Welcome to share your views in the message area.
"Disclaimer : This article is the author's independent opinion, does not represent the vernacular blockchain position, nor does it constitute any investment opinions or suggestions. The copyright of the article and the final interpretation right belong to the vernacular blockchain. A