为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 比特币基础> 正文

区块链私钥的重要性有哪些,区块链私钥的重要性是什么

发布时间:2023-12-19-08:39:00 来源:网络 比特币基础 区块   重要性   链私钥

区块链私钥的重要性有哪些,区块链私钥的重要性是什么

区块链私钥的重要性是不容忽视的,它是区块链系统中最重要的一部分,是用户控制资产的唯一凭证。本文将深入介绍区块链私钥的重要性,以及它的三个关键词:安全性、可靠性、完整性。

安全性

区块链私钥的安全性是指它可以有效地保护用户的资产,确保用户的资产不会被未经授权的第三方访问或窃取。区块链私钥是由一系列随机数字和字母组成的,它的安全性极高,计算机经过长时间也无法破解。此外,用户的私钥只有用户自己知道,因此可以有效地保护用户的资产不被未经授权的第三方访问或窃取。

可靠性

区块链私钥的可靠性是指它可以有效地保证用户的资产不会被未经授权的第三方更改或篡改。区块链私钥是由一系列随机数字和字母组成的,私钥的算法是由区块链系统提供的,因此它的可靠性极高,可以有效地保证用户的资产不被未经授权的第三方更改或篡改。

完整性

区块链私钥的完整性是指它可以有效地保证用户的资产不会被未经授权的第三方篡改或删除。区块链私钥是由一系列随机数字和字母组成的,它的完整性极高,可以有效地保证用户的资产不被未经授权的第三方篡改或删除。此外,用户的私钥只有用户自己知道,因此可以有效地保护用户的资产不被未经授权的第三方篡改或删除。

总之,区块链私钥的安全性、可靠性和完整性是极其重要的,它们可以有效地保护用户的资产,确保用户的资产不会被未经授权的第三方访问或篡改。因此,用户在使用区块链系统时,必须牢记区块链私钥的重要性,确保它们的安全性、可靠性和完整性。


请查看相关英文文档

① [Cat Talk] There are two keys to open a Bitcoin wallet: private key and public key

If you don’t understand the blockchain, you don’t know the public key and private key. The most basic concept is that for a newcomer to the cryptocurrency industry, owning a wallet is like poking a crocodile in the head with your finger. The risk is extremely high. This article is dedicated to new friends in the currency circle to help you sort out the basic common sense of Bitcoin wallets.

Blockchain Observation Network mentioned in the article "What is Blockchain" that in the blockchain world, everyone has two unique virtual keys: public key and private key.

"Public key" can be simply understood as a bank card, which can be sent to the counterparty of the transaction. The bank card number is equivalent to the "address" used in Bitcoin transfers.

To put it more professionally, the public key is a 65-byte string. How long is it? 130 letters and numbers piled together. If the public key is too long, firstly, it will be too troublesome to make transactions. Secondly, why do you have to expose the true content of the public key? This is like taking out your bank card and showing it to others everywhere. Therefore, the address we see now is a shorter public key generated by the digest algorithm.

The other party can send you money only if they know your address; moreover, anyone who has your address can check the number of transactions (No. Transactions) of this wallet address on the official website of Blockchain.info, and receive How many Bitcoins have been received (Total Received), and how many Bitcoins are left in the wallet (Final Balance), as shown below:

"Private key" is like a bank card that cannot be told to others. password. It is a string of 256-bit random numbers. Because it is particularly inhumane for non-IT users to remember this binary private key full of 0s and 1s, this large string of private keys was processed, and the final private key was a string starting with 5/K/L presented before us.

The relationship between public key, private key and address is:

1) Private key → public key → address

The private key generates a unique corresponding public key key, and the public key generates a unique corresponding address;

2) Private key encryption, public key decryption

In other words, A uses the private key to encrypt the transaction information (digital signature ), B uses A’s public key to decrypt the digital signature.

Among them, the private key is an extremely private thing. If you send your private key to someone else, start writing a novel now. The name has been decided for you, and it will be called "Farewell, Bitcoin."

If it were Li Xiaolai,Big names in the currency circle such as Shi (who is said to own hundreds of thousands of BTC online) strongly recommend using cold wallets (offline wallets) and storing them separately; the rich people on TV have their own safes in banks, and you can refer to them if possible.

At that time, the above method was the safest approach. But as the successor of Leek, let’s assume for the moment that we only use idle funds and hold a small number of Bitcoins, for example, less than 5. Then, cold wallets that cost thousands and are complex to operate are a bit overkill; therefore, Blockchain Observation Network limits the choices to exchanges and light wallets:

On the trading platform If you buy (a very small amount of) Bitcoin on the exchange, you can continue to store it on the exchange without withdrawing it. This method is most suitable for newbies in the currency circle. Before we have a deep understanding of the story behind each cryptocurrency, we are always full of curiosity. Bitcoins placed on the exchange can be directly traded. The transaction is simple and fast, without the need to go through a digital wallet. ; On the other hand, the platform has a complete range of currencies, which can satisfy our early adopter mentality and make it easy to try out our skills at any time.

Moreover, large exchanges such as Huobi and Binance (which have been blocked) not only have a much higher security level than some small platforms designed to harvest leeks, but are also simple to operate and can be used quickly. To get started, you only need to keep your account and password safe (for a higher level of security, turn on Google two-step verification), and leave the rest to the platform.

It is worth noting that the assets stored on the exchange do not entirely belong to ourselves, but rather are lent to the platform. The number we see in the asset column is equivalent to the platform providing us with A white note for borrowing money. In addition, the trading platform itself is not decentralized. If security measures are not in place, users’ account passwords may be obtained by hackers.

Light wallets are relative to "full node" wallets.

Full-node wallets, such as Bitcoin-Core (core wallet), need to synchronize all blockchain data when running, occupy a considerable amount of memory space (currently at least 50GB or more), and are completely decentralized;

Although the light wallet also relies on other full nodes on the Bitcoin network, it only synchronizes transaction data related to itself, basically achieving decentralization and improving user experience.

According to different device types, we divide light wallets into:

1) PC wallet: suitable for computer desktop operating systems (such as Windows/MacOS/Linus);

2) Mobile wallet: suitable for Android and iOS smartphones, such as Bitether wallet (Ethereum also has a PC version);

3) Web wallet: accessed through a browser, such as mentioned above The web version of blockchain.

Light wallets are relatively simple to operate and are generally available for free. When applying for a wallet, the system will generate a private key. Get ready to hit the blackboard!

1) Do not take screenshots or photos and store them in your mobile phone;

2) Do not send the private key information to anyone;

3) It is best to copy it by hand (several copies) , hide in the place where you feel safest.

In a word, whoever masters the private key of the wallet has absolute control of the wallet. As long as the private key is in your hands, your Bitcoins will never be lost.

Finally, a few words. As ordinary investors, we don’t need to do much:

1) Take a snack and don’t lose your mobile phone. After all, you have lost the right mobile phone. The Bitcoin wallet in there is risky;

2) Don’t delete the wallet application on the device. Unless you decide not to use this wallet anymore, it will be very troublesome later;

3) Set a complex password (see point 1 for the reason) and remember it carefully. This is what you will keep if the private key is lost.

For those of you who can’t remember your password and are too lazy to back up your private key scientifically, let’s just keep the money in the bank.

② The blockchain cannot be casually told to others: BTC private key, BTC address or wallet security password

This is the order of importance: BTC private key, wallet security password, BTC Address
The private key is everything and must not be told to anyone.
As long as you have the private key, you can re-import the wallet and reset the wallet security password.
A BTC account can have many addresses, so the least important thing is the address. No matter how unimportant it is, don't tell others casually.

③ The importance of blockchain wallets

Now more and more people are beginning to participate in blockchain projects, and those who understand and participate in them believe that they will use blocks Chain wallet, the "wallet" here refers to a virtual tool used to store and use virtual currency.

Wallets are mainly divided into cold wallets and hot wallets, which include private keys, public keys and auxiliary words. Next, I will explain their differences and functions in detail.

Cold wallet: A cold wallet refers to a wallet that is not connected to the Internet and stores digital currency offline. Users generate digital currency addresses and private keys on an offline wallet and then save them. The cold wallet integrates functions such as digital currency storage, multiple transaction password settings, publishing the latest market conditions and information, and providing hard fork solutions, which can effectively prevent hackers from stealing.

Hot wallet: Hot wallet refers to a wallet that needs to be connected to the Internet. It is more convenient to use, but now the network is more complex, there are many phishing websites, and there are risks, so it is difficult to use a wallet or exchange. It is best to set different passwords and enable secondary authentication to ensure the security of your assets.

In summary, the cold wallet ratioHot wallets are more secure.

Private key: The private key is a string of data generated by a random algorithm. It can calculate the public key through an asymmetric encryption algorithm, and the public key can then calculate the currency address. The private key is very important, as the password is hidden from all but the owner of the address. Blockchain assets are actually on the blockchain. The owner actually only owns the private key, and has absolute control over the blockchain assets through the private key. Therefore, the core issue of blockchain asset security lies in the storage of the private key. The owner must keep it safe. Compared with the traditional form of username and password, the biggest advantage of using public key and private key transactions is to improve the security and integrity of data transmission. Because of the corresponding relationship between the two, users basically do not have to worry about the data transmission process. The possibility of being intercepted or modified by hackers. At the same time, because the private key encryption must be decrypted by the public key it generates, the sender does not have to worry about the data being forged by others.

Public key: The public key appears in pairs with the private key. Together with the private key, they form a key pair and are stored in the wallet. The public key is generated from the private key, but the private key cannot be derived from the public key. The public key can obtain the wallet address through a series of algorithm operations, so it can be used as a certificate of ownership of this wallet address.

Mnemonic phrase: The mnemonic phrase uses a fixed algorithm to convert the private key into more than ten common English words. The mnemonic phrase and the private key are interoperable and can be converted into each other. It is just a friendly format for the private key of the blockchain digital wallet.

Keystore: Mainly common in the Ethereum wallet App (Bitcoin is similar to the Ethereum Keystore mechanism: BIP38). It is obtained by re-encrypting the private key through the wallet password, and the mnemonic phrase Different, generally it can be saved as text or JSON format. In other words, Keystore needs to be decrypted with the wallet password before it is equivalent to the private key. Therefore, Keystore needs to be used with the wallet password to import the wallet. When a hacker steals the Keystore, without a password, it is possible to unlock the Keystore by brute force cracking the Keystore password. Therefore, it is recommended that users set a slightly more complicated password, such as adding special characters, at least 8 characters, and make it safe. storage.

In summary: The function of the wallet is to protect our private key. The private key is the full authority to control the assets. Only those who have the private key can use the virtual currency in this account. When using the wallet, remember not to disclose your wallet's private key, mnemonic phrase, Keystore and other information to others. This information is important information that can directly steal your digital assets.

Things to note when using the wallet:

1. Back up your private key and mnemonic phrase, except on your mobile phoneIt is best to write a handwritten copy and save it.

2. Do not click on unknown websites easily.

3. Do not take screenshots or take photos to save.

In short, the most important thing is to keep your private key.

④ What is the role of blockchain?

The concept of blockchain can be said to be particularly popular and trendy now. As long as you attach this concept, you can attract money. Which blockchain has What does it do?

Building a Digital Identity

Just like our guide, how does the blockchain selling skill work? The discussion is like this. The signature component of blockchain skills is completed using keys. Combining the public key and the private key can be referenced based on the strong digital identity of the possession.

How the public key is called Pei Lu in the crowd Identifiable (e.g. email address), private keys are a way of expressing consent for digital interactions. Cryptography is an important force behind blockchain innovation.

As a system of record

Our Strategy What is a distributed ledger? .Blockchain is an innovation in information registration and distribution. It is suitable for recording static data (registry) and dynamic data (transactions), evolving the recording system.

In the registry, data can be passed through three Any combination of methods is stored in the blockchain:

Unencrypted data - can be read by every blockchain participant in the blockchain with full transparency.

Encrypted Data - participants and decryption keys are read. The key can access the data of the block chain, proving who added the data and the time when the data was added.

⑤ Blockchain-based numbers like Integrity Coin What exactly are private keys, public keys, and addresses in currency?

Many novices are confused by the relationship between private keys, public keys, addresses, etc. when they first enter the market. Some even lost their private keys, and there was a lot of money in the address, but they just couldn't get it out. Today Xiaobai will explain to you the relationship between private keys, public keys, and addresses.

The relationship between the private key, public key and address is:

The private key is converted (generated) into a public key, and then converted into an address. If there is Bitcoin or integrity coins on an address, you can Spend the integrity coins above using the private key converted to this address. The generation of public key and address both depends on the private key, so the private key is the most important.

The same is true for mobile wallets, but because the file management method of mobile phones is not as convenient as that of computers. Therefore, generally mobile wallets will provide a function called or similar to "Export Private Key". Through this function, the private key can be exported in various forms.

For example, the Bitcoin mobile wallet can be exported as a QR code, which can be printed or scanned onto paper. When changing your mobile phone, install your Bitcoin wallet and scan this QR code to migrate your Bitcoins. The Bitcoin mobile wallet and the Integrity Coin mobile wallet can be exported as a clear text string and printed on paper - this is a paper wallet.

Paper wallet allows users to access any Bitcoinor the Integrity Coin wallet terminal to spend your Bitcoins or Integrity Coins.

As the wallet is lost or damaged, the private key will be lost, thereby completely losing the right to transfer the digital currency. To prevent such a tragedy, remember to always back up the data in your wallet. In addition to the address, all private keys are also saved during the backup.

Summary

The private key must be protected to prevent loss and forgetting. The method will be cleared when clearing information on the mobile phone. It is best to copy it by hand, but do not disclose it.

You must prevent your wallet from being lost or damaged, resulting in the loss of the private key and the loss of the right to transfer digital currency. Otherwise, no matter how many coins you have, it is still useless if you cannot withdraw them.

⑥ Private key and public key in the blockchain

The public key (public key, referred to as the public key) and the private key (private key, referred to as the private key) are passwords Learn the content of asymmetric encryption algorithms. As the name suggests, the public key can be made public, while the private key must be kept securely.

The private key is generated by a random seed, and the public key is derived from the private key through an algorithm. Because the public key is too long, for simplicity and practicality, an "address" appears, and the address is derived from the public key. These derivation processes are one-way and irreversible. That is, the address cannot derive the public key, and the public key cannot derive the private key.

From this we can see that the public key and the private key exist in pairs. Their usefulness can be summarized in 16 words: public key encryption, private key decryption; private key signature, public key signature verification.

Public key encryption, private key decryption. That is, the original data is encrypted with the public key, and only the corresponding private key can decrypt the original data. This prevents the original data from being stolen during transmission on the network and protects privacy.

Private key signature, public key signature verification. Use the private key to sign the original data, and only the corresponding public key can verify that the signature string matches the original data.

Locks and keys can be used as metaphors for public keys and private keys. The lock is used to lock an item, and the key is used to unlock the item. The key owner is the owner of the item. In fact, this is the case. The public and private key pairs establish the ownership of the blockchain's account system and assets (Token, etc.). The blockchain assets are locked on the public key, and the private key is used to unlock the asset and then use it. For example, if I want to transfer assets to you, I use my private key to sign a transaction in which I transfer assets to you (including assets, quantity, etc.) and submit it to the blockchain network. The node will verify the signature and it is correct. Then the assets are unlocked from my public key and locked to your public key.

We have seen the role of the private key. It is as important as the password of the centralized accounting system (Alipay, WeChat Pay, etc.). Having the private key means ownership of the asset, so we must keep it. A good private key cannot be leaked.

⑦ How does blockchain technology protect the privacy and rights of information subjects

Privacy protection methods can be divided into three categories:
First, the privacy protection of transaction information; sender, deliverPrivacy protection for recipients and transaction amounts, including currency mixing, ring signatures, and confidential transactions.
The second is privacy protection for smart contracts, and protection solutions for contract data, including zero-knowledge proof, multi-party secure calculation, homomorphic encryption, etc.
The third is the privacy protection of data on the chain, which mainly includes solutions such as ledger isolation, private data and data encryption authorized access.
Extended information:
1. Blockchain encryption algorithm isolates identity information and transaction data
1. Transaction data on the blockchain, including transaction address, amount, transaction time, etc., are open, transparent and queryable . However, the identity of the user corresponding to the transaction address is anonymous. Through the blockchain encryption algorithm, the separation of user identity and user transaction data is achieved. Before the data is saved to the blockchain, the user's identity information can be hashed, and the resulting hash value is used as the user's unique identifier. The user's hash value is stored on the chain instead of the real identity data information. Transaction data is bundled with hash values ​​rather than user identity information.
2. Therefore, the data generated by users is real. When using these data for research and analysis, due to the irreversibility of the blockchain, no one can restore the name, phone number, and email address of registered users through hash values. and other private data, playing a role in protecting privacy.
2. Blockchain "Encrypted Storage + Distributed Storage"
Encrypted storage means that a private key must be provided to access data. Compared with ordinary passwords, private keys are more secure and almost impossible to be cracked by violence. . Distributed storage and decentralized features reduce the risk of all data being leaked to a certain extent. However, with centralized database storage, once the database is attacked by hackers, all data can easily be stolen. Through "encrypted storage + distributed storage", users' data privacy can be better protected.
3. Blockchain consensus mechanism prevents individual risks
The consensus mechanism is a mechanism for blockchain nodes to reach a consensus on block information across the entire network, which can ensure that the latest blocks are accurately added to the blockchain and node storage The blockchain information is consistent and unforked, which can resist malicious attacks. One of the values ​​of the blockchain lies in the consensus governance of data, that is, all users have equal management rights to the data on the chain. Therefore, the risk of individual mistakes is first eliminated from the operation. Data decentralization is solved through the network-wide consensus of the blockchain, and zero-knowledge proofs can be used to solve verification problems and realize the scenario of using user privacy data in a public decentralized system. While meeting the needs of the Internet platform, it also So that part of the data is still only in the hands of the user.
4. Blockchain Zero-Knowledge Proof
Zero-knowledge proof means that the prover can make the verifier believe that a certain assertion is correct without providing any useful information to the verifier, that is, proof The investor can fully prove that he is the legal owner of certain rights and interests without leaking relevant information, that is, the "knowledge" to the outside world is "zero". By applying zero-knowledge proof technology, data correlation verification can be realized in the case of ciphertext, ensuring dataEnable data sharing while maintaining privacy.

⑧ [Blockchain] Bitcoin private key, public key, signature

When understanding the basic noun concept of blockchain, it is mentioned that the address is composed of characters and numbers, but there is no explanation. How it came about. The bank card number is generated by the bank's core system, so how is the Bitcoin address generated? Look at the picture below:

For those who are new to Bitcoin, they will be confused when they see this picture. What are private keys and public keys? Why is it so troublesome to generate an address?

Now please remember this sentence: The private key generates the public key through elliptic curve multiplication, and the private key cannot be derived using the public key; the public key generates the Bitcoin address through the hash function, and the address cannot be derived Export the public key.

The address is calculated through such a complex algorithm. Are the private key and public key just for generating the address? No, they have other uses. Let’s first understand the private key and public key.

Now that we have explained the concepts of addresses, mining, proof of work, computing power, blocks, blockchain, etc., do you still have any impressions? If you forget, please review these concepts because they will be used in many places later. Tomorrow I will explain the characteristics of blockchain.

Reference books: "Mastering Bitcoin"
Blockchain knowledge topics:

Bitcoin accounting method (Blockchain knowledge 2)
Understanding blocks Basic noun concept of chain (blockchain knowledge 1)

⑨ Why are the letters in the blockchain private key only between a-f?

Private key: actually a set of random numbers , We have already introduced the random numbers in the blockchain
Public key: The private key is generated by the elliptic curve encryption algorithm, but the private key cannot be obtained through the public key backwards. The function of the public key is to use your own private key to encrypt information when transacting with the other party, and then the other party uses its own public key to decrypt and obtain the original information. This process is commonly known as signature.
Address: Since the public key is too long and is inconvenient to use in transactions, the public key hash is encrypted with SHA256, RIPEMD160, and Base58 algorithms to generate an address

First, use a random number generator to generate a "Private key". Subsequent public keys and addresses will be generated by the private key, so the importance of the private key can be summarized in one sentence: "Whoever masters the private key has the right to use the wallet!"

『Private key 』The 'public key' is generated through elliptic curve algorithm (SECP256K1) algorithm encryption. thisIt is an asymmetric one-way encryption algorithm. Knowing the private key can calculate the public key, but knowing the public key cannot reversely calculate the private key

The "public key" undergoes a one-way Hash algorithm (SHA256, RIPEMD160) Generate "Public Key Hash"

Connect the one-byte address version number to the "Public Key Hash" header (for the pubkey address of the Bitcoin network, this byte is "0"), Then perform two SHA256 operations on it, use the first 4 bytes of the result as the check value of the "public key hash", and connect it to the end.

Use BASE58 to encode the result of the previous step (customized version of Bitcoin) to get the "wallet address".

⑩ Encryption technology of blockchain

Digital encryption technology is the key to the application and development of blockchain technology. Once the encryption method is cracked, the data security of the blockchain will be challenged, and the tamperability of the blockchain will no longer exist. Encryption algorithms are divided into symmetric encryption algorithms and asymmetric encryption algorithms. Blockchain primarily uses asymmetric encryption algorithms. Public key cryptography systems in asymmetric encryption algorithms are generally divided into three categories according to the problems they are based on: large integer differentiation problems, discrete logarithm problems and elliptic curve problems. First, introduce blockchain encryption technology. Encryption algorithms are generally divided into symmetric encryption and asymmetric encryption. Asymmetric encryption refers to encryption technology integrated into the blockchain to meet security requirements and ownership verification requirements. Asymmetric encryption usually uses two asymmetric keys, called public and private keys, in the encryption and decryption process. Asymmetric key pairs have two characteristics: First, after one key (public key or private key) encrypts information, it can only decrypt the other corresponding key. Second, the public key can be disclosed to others, while the private key is kept confidential, and others cannot calculate the corresponding private key through the public key. Asymmetric encryption is generally divided into three main types: large integer differentiation problems, discrete logarithm problems and elliptic curve problems. The problem class of large integer differentiation refers to using the product of two large prime numbers as the encrypted number. Since the appearance of prime numbers is irregular, solutions can only be found through constant trial calculations. The discrete logarithm problem class refers to an asymmetric distributed encryption algorithm based on the difficulty of discrete logarithms and strong one-way hash functions. Elliptic curve refers to the use of flat elliptic curves to calculate a set of asymmetric special values. Bitcoin uses this encryption algorithm. The application scenarios of asymmetric encryption technology in blockchain mainly include information encryption, digital signature and login authentication. (1) In the information encryption scenario, the sender (denoted as A) encrypts the information with the public key of the receiver (denoted as B) and sends it to

B, who uses his own private key Decrypt the information. Encryption of Bitcoin transactions falls into this scenario. (2) In a digital signature scenario, sender A uses its own private key to encrypt the information and sends it to B. B uses A's public key to decrypt the information and then ensures that the information was sent by A. (3) In the login authentication scenario, the client encrypts the login information with the private key and sends it to the server, and the server uses the client’sPublic key decryption authenticates login information. Please note the differences between the above three encryption schemes: information encryption is public key encryption and private key decryption, ensuring the security of the information; digital signature is private key encryption and public key decryption, ensuring the ownership of the digital signature. Authenticated private key encryption and public key decryption. Taking the Bitcoin system as an example, its asymmetric encryption mechanism is shown in Figure 1: The Bitcoin system generally generates a 256-bit random number as a private key by calling the random number generator at the bottom of the operating system. The total number of Bitcoin's private keys is large, and it is extremely difficult to traverse all private key spaces to obtain Bitcoin's private keys, so cryptography is safe. In order to facilitate identification, the 256-bit binary Bitcoin private key will be converted through the SHA256 hash algorithm and Base58 to form a 50-character long private key, which is easy for users to identify and write. Bitcoin's public key is a 65-byte random number generated by the private key through the Secp256k1 elliptic curve algorithm. Public keys can be used to generate addresses used in Bitcoin transactions. The generation process is that the public key is first hashed through SHA256 and RIPEMD160 to generate a 20-byte summary result (that is, the result of Hash160), and then converted through the SHA256 hash algorithm and Base58 to form a 33-character Bitcoin address. The public key generation process is irreversible, that is, the private key cannot be derived from the public key. Bitcoin’s public and private keys are usually stored in Bitcoin wallet files, with the private key being the most important. Losing the private key means losing all the Bitcoin assets of the corresponding address. In the existing Bitcoin and blockchain systems, multi-private key encryption technology has been derived based on actual application requirements to meet more flexible and complex scenarios such as multi-signatures.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 39360 文章总数
  • 3637476访问次数
  • 3091建站天数