GP7
  • GP7 App
  • General Info about the Application
    • Installing the Application
    • The Main Functionality of the Service
    • User Authentication
  • Operations with Accounts
    • Enabling and Disabling Cryptocurrencies
    • Checking Your Balance and Viewing the Transaction History
    • Receiving Cryptocurrency to Your Account
    • Sending Cryptocurrency from Your Wallet
    • Transfer Fee
  • Cryptography for Interaction with Blockchain
    • Digital Signature Generation
    • Restoring Access
    • Key Generation and Recovery Key Export
    • Recovery Key Export
    • Viewing and Manually Uploading Keys in Key Manager
    • Restoring Access and Importing the Recovery Key
  • Cryptocurrencies
    • Blocks and Transactions
    • Features of Bitcoin and Bitcoin Cash
    • Ethereum Features
    • EOSIO Features
    • XRP Features
    • USDT Features
    • TRON Features
  • Assets
Powered by GitBook
On this page

Was this helpful?

  1. Cryptography for Interaction with Blockchain

Restoring Access

PreviousDigital Signature GenerationNextKey Generation and Recovery Key Export

Last updated 4 years ago

Was this helpful?

In a simple secret key scenario, a backup is used to restore access. It does not protect the key from being compromised; rather, it even increases the risks associated with maintaining the confidentiality of not only the active copy, but also the backup.

Using a distributed key, you can back up each of the components and recover lost components in the same way, but GP7 uses an alternative way that does not increase risks.

Key separation in GP7 Wallet occurs in such a way that only two of the three components are needed to generate the signature.

Let’s assume that the complete key is ABC. It's distributed components are AB, BC, and AC. It’s clear that the complete key can be obtained using any two components. This is called threshold division. In this case, if the user loses one of the components, he/she can still create signatures but risks losing control in case another component gets lost, so it is necessary to recover the initial state with three components as soon as possible.

For recovery, first, three new keys — XYZ — are generated, and then transactions are signed using the saved components of ABC in order to transfer all available funds from ABC to XYZ.