OPZ
  • Introduction
    • Overview
    • Roadmap
      • ✔️2022: Q1-Q2
      • ✔️2022: Q3-Q4
      • ✔️2023: Q1-Q2
      • ✔️2023: Q3-Q4
      • ✔️2024: Q1-Q2
      • ✔️2024: Q3-Q4
      • 2025: Q1-Q2
      • 2025
  • KeyFusion
    • Introduction to KeyFusion
    • Key Concepts and Techniques
      • Key Generation
      • ECDSA Signing Process
      • Schnorr/EdDSA Signing
    • Security and Usability
  • OPZ App
    • Introduction to OPZ app
    • Getting Started
    • Security
      • Token Safety, Address Verification, and dApp Security
      • MPC-2FA Signing
      • Anti-Zero Transfer
    • Advanced Settings
  • OPZ-AI
    • Introduction OPZ-AI
    • Superintelligence Trader
    • Features
    • OPZ TestNet
  • OPZ-NFC
    • Introduction OPZ-NFC
    • Getting Started
    • NFC-Only Mode
    • OPZ CARD
  • OPZ-DEX (Beta)
    • OPZ-DEX
    • Trading Architecture
    • Type and Time-In-Force
    • Status & Priority Rules
    • Funding Rate Structure
    • OPZ Network
    • Referral Program
    • Resource Hub
  • Community & Tokenomics
    • OPZ Token Overview
    • Presale Schedule
    • Trade & Earn
  • Misc
    • Brand Logo & Guidelines
    • Bug Bounty
Powered by GitBook
On this page
  • Simple Example:
  • Two-Party Elliptic-Curve Mechanism
  • MPC Key Generation
  • MPC Signing Process

Was this helpful?

  1. KeyFusion

Key Concepts and Techniques

Last updated 28 days ago

Was this helpful?

The current version of OPZ utilizes two-party computation protocols, with the key shared between the User and OPZ server.

Simple Example:

OPZ uses secure two-party computation, which enables two parties (user & OPZ server) to evaluate an arbitrary function f on their respective private inputs x,yx,yx,y while revealing nothing but the result z=f(x,y)z=f(x,y)z=f(x,y)

  1. Inputs: The user has a private input xxx and the OPZ server has a private input yyy.

  2. Computation: A function fff is computed, where f:(X,Y)→Zf:(X,Y)→ Zf:(X,Y)→Z and X,Y,ZX,Y,ZX,Y,Z are the domains of x,y,x,y,x,y, and zzz respectively.

  3. Output: The result of the computation is zzz, where z=f(x,y)z=f(x,y)z=f(x,y).


Two-Party Elliptic-Curve Mechanism

MPC Key Generation

Instead of generating a key and then splitting it, an MPC protocol is used to generate the key shares. This ensures the key is never exposed on a single device, greatly reducing the risk of compromise.


MPC Signing Process

Signing is crucial for securing transactions in our Multi-Party Computation (MPC) wallet. This process involves collaboration between the OPZ server and the user device.

We use two distinct MPC signing processes to adapt to the various requirements of different blockchains:

  1. ECDSA (Elliptic Curve Digital Signature Algorithm):

  1. Schnorr/EdDSA (Edwards-curve Digital Signature Algorithm):

By supporting these two key signing protocols, we provide a comprehensive solution adaptable to various blockchain environments.

Key Generation
ECDSA Signing Process
Schnorr/EdDSA Signing