Standard blockchain-based solutions for cryptocurrency, tokenized assets, and data encryption use a single private cryptographic key assigned to the transaction creator.
Mar 03 2021 | ArticleEven a few years ago, experts thought it would take more than 25 years for quantum computers to be able to brute-force crack a standard 2048 bit RSA key. However, recent advancements in quantum code-breaking algorithms have lowered the computational overhead by two magnitudes.[1]
Moore's Law, stating "the number of transistors in an integrated circuit will double every two years,” is now considered void and has been replaced with Nevens law which states quantum computers will grow at "a doubly-exponential rate." [2]
The risk is significant because most financial and governmental institutions estimated that they would have at least ten years to solve the issue of quantum-resistant cryptography. Now depending on who you ask, this time-frame may be compressed into five years from today.
Man who accidentally threw out a bitcoin fortune offers $70 million for permission to dig it up.
James Howells at the Newport Amenity Centre and landfill site, after throwing away a hard drive with 7,500 Bitcoin. Photo - CNN
The majority of the self-managed crypto keys in distribution have no recourse if they are lost, stolen, or destroyed. There are a few third-party custodial services such as Coinbase Custody. They offer an abstraction layer to your digital asset or crypto and can recover or reverse some transactions.
Crypto keys typically come with a single private key, which means if anyone obtains that key, they have complete and unfettered access to whatever is behind that key. This may be an acceptable risk for an individual; however, this approach is not secure for a corporation with significant assets under management.
Many crypto wallet developers now offer multi-signature accounts, which have a physical world analogy of a company check or bank transfer that requires two signatures prior to authorization.
A multi-signature wallet is a good workaround; however, a more efficient solution would be to integrate the key technology into the primary blockchain code rather than a component, effectively a microservice level solution, which brings us to Shamir's Secret Sharing.
Adi Shamir, a cryptologist in 1997, presented a cryptographic algorithm which he described in Differential Fault Analysis of Secret Key Cryptosystems. It is more commonly known as Shamir's Secret Sharing.
The algorithm is unique because it can take a single private key and slice it into an arbitrary number of pieces, with a minimum quorum being required to unlock the key.
If you take a key and slice it four ways and then demand a quorum of 3 pieces, even if a piece gets destroyed, the other three keyholders still have access to recreate the original secret key.
Zero-Trust is an added layer of security by adding a decryption key to the solution.[3]
The key is responsible for translating the individual pieces into their original characters. If every piece were compromised via collusion or a cyber attack, the contents would still appear to be indecipherable gibberish without the decrypting key. This key is best held by a trusted third party.
One of the more innovative and current approaches is to use Shamir's algorithm in combination with secure multiparty computation (SMPC/MCP). This is frequently used with fully homomorphic encryption (FHE) to enable data processing, analysis, and machine learning of fully encrypted data, without revealing the source.
SMPC is commonly combined with FHE, enabling analysis, data science, and computation on the underlying data without ever breaching its autonomy.
This encrypted compute level is beneficial for confidential or sensitive information such as medical telemetry, personal finance, insurance adjustment, and other highly regulated fields where a shortage of data exists outside of siloed sources. The above model allows for the commercial and generous use of data without ever compromising someone's autonomy.
Fully homomorphic encryption essentially allows computation on the underlying data without decrypting it first, preserving privacy.
One blockchain software engineering company, in particular, is actively putting financial cybersecurity at the forefront of its Blockchain services.
Openware, Inc. (San Francisco, California) has a mission to create a safe, transparent and universally accessible financial ecosystem. The company was initially founded in France by notorious cloud architects Louis Bellet and Camille Meulien and is dedicated to developing advanced Blockchain technologies for economic infrastructure.
Openware's solutions enable enterprises and developers to build cryptocurrency exchanges, advanced distributed ledger applications, open alternative digital marketplaces, and launch next-generation financial infrastructures.
The company is also the core contributor to several Blockchain projects and the license provider for the OpenDAX crypto exchange software stack, provisioning enterprise services on top of the open-source components, including education, support, and software R&D.
For more information about Openware, please visit www.openware.com
[1]: How a quantum computer could break 2048-bit RSA encryption in 8 hours https://www.technologyreview.com/2019/05/30/65724/how-a-quantum-computer-could-break-2048-bit-rsa-encryption-in-8-hours/#:~:text=A%20new%20study%20shows%20that,for%2025%20years%20or%20so.&text=Many%20people%20worry%20that%20quantum,used%20to%20send%20secure%20messages?ref=openware.com
[2]: Neven’s Law replaces Moore’s Law for Quantum Computing https://community.hitachivantara.com/s/article/moores-law-is-replaced-by-nevens-law-for-quantum-computing?ref=openware.com
[3]: Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol https://arxiv.org/ftp/arxiv/papers/1608/1608.05097.pdf?ref=openware.com