Decentralised key recovery is a method for helping users regain access to their digital keys, such as those used for cryptocurrencies or secure communication, without relying on a single person or organisation. Instead of trusting one central entity, the responsibility for recovering the key is shared among several trusted parties or devices. This approach makes…
Category: Decentralised Systems
DID Resolution
DID Resolution is the process of taking a Decentralised Identifier (DID) and finding the information connected to it, such as public keys or service endpoints. This allows systems to verify identities and interact with the correct services. The process is essential for securely connecting digital identities with their associated data in a decentralised way.
Self-Sovereign Identity
Self-Sovereign Identity (SSI) is a way for people to control and manage their own digital identities, rather than relying on companies or governments to do it for them. With SSI, you store your identity information yourself and decide who can see or use it. This helps protect your privacy and gives you more control over…
Verifiable Credentials
Verifiable Credentials are digital statements that can prove information about a person, group, or thing is true. They are shared online and can be checked by others without needing to contact the original issuer. This technology helps protect privacy and makes it easier to share trusted information securely.
Decentralized Credential Systems
Decentralised credential systems are digital methods for issuing and verifying qualifications, certificates, or proofs of identity without relying on a single central authority. Instead, these systems use distributed technologies such as blockchain to ensure credentials are secure, tamper-resistant, and easily shareable. This approach gives individuals more control over their personal information and makes it harder…
Statechain Protocols
Statechain protocols are a type of cryptographic technology designed to transfer ownership of digital assets, such as Bitcoin, without moving them on the public blockchain. Instead, control over the asset is passed between parties using a secure chain of signatures and encrypted messages, which are verified by a trusted server called a statechain entity. This…
Covenant-Enabled Transactions
Covenant-enabled transactions are a type of smart contract mechanism in blockchain systems that allow rules to be set on how coins can be spent in the future. With covenants, you can restrict or specify the conditions under which a transaction output can be used, such as who can spend it, when, or how. This helps…
Taproot Upgrades
Taproot upgrades are improvements made to the Bitcoin network to enhance privacy, efficiency, and flexibility. They allow complex transactions to look like simple ones, making it harder to distinguish between different types of Bitcoin spending. These upgrades also make it cheaper and easier to use advanced features like multi-signature wallets and smart contracts.
MuSig2 Protocol
MuSig2 is a cryptographic protocol that allows multiple people to create a single digital signature together. This makes it possible for a group to jointly authorise a transaction or message without revealing each person’s individual signature. MuSig2 is efficient, more private, and reduces the size of signatures compared to traditional multi-signature methods.
Aggregate Signatures
Aggregate signatures are a cryptographic technique that allows multiple digital signatures from different users to be combined into a single, compact signature. This combined signature can then be verified to confirm that each participant individually signed their specific message. The main benefit is that it saves space and improves efficiency, especially when dealing with many…