1Keeper
  • 🖐️Welcome
  • Introduction
    • Download 1Keeper App
    • Technical Overview
    • Business Scenarios
  • Tutorials
    • How to register a 1Keeper account with iPhone?
    • How to register a 1Keeper Account? - Android Phone
    • How to Log Out?
    • How to Switch Networks ?
    • How to Add a Token?
    • How to Add Network?
    • How to Backup MPC?
    • How to Invite a new Member?
    • How to Accept an Invitation?
    • How to Change a Member’s role?
    • How to switch wallet?
    • How to Change Theme?
    • How to Change Language?
    • How to Change your Nickname?
    • How to change your Avatar?
    • How to change your Wallet Avatar?
    • How to rename your Wallet?
    • How to recover your 1Keeper Account?
    • How to copy your SOL Address?
    • How to receive SOL tokens?
    • How to transfer coins (SOL)?
    • How to remove additional logins?
    • How to interact with Dapp?
    • How to Use the Market Sorting Features
    • How to Add a Token to Your Collection?
    • How to search for Tokens?
    • How to Purchase Tokens?
    • How to Sell Tokens on the Market?
  • Where to Find Your Trading History?
  • FAQ
  • About us
    • Contact Us
    • Join Us
    • Follow Us
    • Business Collaboration
  • Learn More
    • Security Audit
    • Privacy Policy
    • Cookie Policy
    • Terms of Service
    • Risk Statement
    • Best Practices for Safety
  • Development
    • Enterprise API
    • Submit Application
    • Submit Assets
    • Submit Public Blockchain
由 GitBook 提供支持
在本页
  • Comparison
  • Computation​
  • Private Keys
  • Signature
  • Summary​
  1. Introduction

Technical Overview

上一页Download 1Keeper App下一页Business Scenarios

最后更新于7个月前

1Keeper utilizes multi-party computing (MPC) technology to achieve high security and collaborative control. It divides the private key into multiple parts and stores them in a distributed manner, effectively addressing the single point of failure associated with externally owned accounts (EOA). MPC technology is an enhancement based on underlying cryptographic algorithms; it does not rely on the implementation of smart contracts and avoids the risks associated with vulnerabilities in both AA wallets and smart contracts themselves.

Comparison

Comparison of Wallet Types:

Feature
MPC Wallet
AA Wallet
EOA Wallet

Definition

A wallet that can fragment and manage private keys in a distributed manner

A wallet implemented through smart contracts

A self-managed wallet based on a single private key

Multi-Signature Support

Supported

Supported

Not Supported

Multi-Signature Policy Change

Supported

Not Supported

Not Supported

Permission Allocation

Supported

Not Supported

Not Supported

Chain Gas Fees

Medium

High

Medium

Multi-Chain Compatibility

High

Low

Medium

Security

High

Low

Medium

User Friendly

High

High

Medium

Representative Projects

1Keeper

-

-

Computation

Supports the following signature algorithms:

Primitive
Supported Curves
Supported Threshold
Supported Blockchains

ECDSA

Secp256k1

2/2、2/3

EVM、Bitcoin、TRON、Filecoin、Dash、Dogecoin、and others

EdDSA

Ed25519

2/2、2/3

NEAR、Sui、Aptos、Solana、Ripple、 and others

Private Keys

  • Generation:This protocol is applicable for generating wallet root key shards. Each party generates local private key shards through the Multi-Party Computation (MPC) protocol, ensuring that the original private key is never exposed during the entire process. It can be understood that the input for each party in the MPC protocol is a locally generated random number. Upon completion of the MPC protocol, the output consists of private key shards, with each party only able to obtain its respective private key shard. These private key shards can be used for distributed signing protocols and more.

  • Derivation:Utilizing BIP44-based enhanced MPC derivation allows users to easily back up and restore their wallets. It supports multiple cryptocurrencies and accounts, thereby improving the wallet's flexibility and security.

  • Refresh:Applicable for securely refreshing wallet private key shards. An old set of private key shards can be transformed into a new set through the private key shard refresh protocol. The protocol's input consists of each party's respective private key shards, while the output is the new private key shards.

Signature

This protocol is suitable for transaction signing scenarios. After executing the distributed private key signing protocol, each party generates a signature for the message, allowing all parties to obtain the signing result while ensuring the original private key is never exposed. It can be understood that the input for each party in the distributed private key signing protocol consists of the local private key shards and the message to be signed, while the output is the signing result.

1Keeper significantly enhances the security and tamper-resistance of digital asset management by fragmenting private keys and conducting secure computations among multiple participants. This approach eliminates single points of failure and meets the complex needs of multi-party control.

Summary

​
​