Litho
  • Lithosphere
  • Abstract
  • Design Concept
  • Design Objectives
  • Smart Contracts & Decentralized Finance (DeFi)
  • Positioning
  • Lithosphere Architecture and Technology
  • Myriad Distributed Key Management (MDKM)
  • Threshold signature
  • Litho Coin
  • LAX – Algorithmic Stablecoin
  • Consensus Mechanism
  • Cross-Chain Integration
  • Cross-Chain Transactions
  • Deep Neural Networks (DNN)
  • LEP100 Multi-chain Token Standard
  • Validators
  • Linear-communication BFT Consensus
  • Myriad Distributed Key Management
  • LEP100 Token Standard
  • Why should your DeFi project use the LEP100 Token Standard?
  • LEP100 Token Features
  • Verification Nodes
  • Locked Account Generation Scheme
    • Introduction
    • General Nodes
    • Design Description
    • Scheme Generation
    • Advantages
      • Easy Integration and Efficient Data Storage
      • Smart Contract Token Transaction Anonymity
      • Fully Decentralized without Third-Party Participation
      • Secure and stable
      • One-Time Account System
      • Ring Signature Scheme
      • Cryptography Based Security Guarantee
      • Smart Contracts
        • Contract multi-triggering mechanism Diversity of triggering conditions
        • Enhancements and compatibility
        • Contract enclosed call
        • Contract development
        • Timing and trigger conditions
        • Rapid development and interface
        • To use multiple triggers to realize complex financial functions
  • Community operation plan
  • Project promotion method
  • A movement to Promote Blockchain Technology
  • The Standardization of Blockchain Interfaces Movement
  • Lithosphere Applications
  • Current Lithosphere Features
    • Lithosphere Products
    • Lithosphere Project Governance
    • Funding for the project
  • Roadmap
  • Conclusion
  • Disclaimer
  • Glossary
Powered by GitBook
On this page
  1. Locked Account Generation Scheme

General Nodes

PreviousIntroductionNextDesign Description

Last updated 3 years ago

The threshold key sharing method is intended to address the issue of secure key management. The security of cryptography is dependent on the security of the keys, according to contemporary cryptography design principles. Cryptography’s security will be jeopardized if secure keys are compromised. As a result, key management is critical in cryptography security research and design. It might be challenging to handle the distribution of keys safely when an account is maintained by numerous persons with diverse interests. Cryptographer Adi Shamir devised the Shamir’s Secret Sharing threshold key sharing technique to tackle this problem.

A key is split into n pieces and handed to n participants in this system. Each participant has a piece of the key share, and the key must be reconstructed using a minimum of k key shares. As a result, each activity on an account will need the cooperation of at least k individuals to maintain the account’s security and reliability.

Based on safe multi-party computation and threshold key sharing, we created the Locked Account creation technique. Lithosphere Validators (Record-keepers) are in charge of maintaining and managing the keys to the Locked Accounts to guarantee that they are secure and reliable. Furthermore, in an ad-hoc network with no set topology, this technique reduces the danger of keys being lost and offers high flexibility and stability.

The following is the Locked Account Generation Scheme:

Design Description
Scheme Generation
Advantages