Chainge Finance
  • The Most Liquid Web 3 Trading Venue
  • 🟡Introduction
    • 💡What Is Chainge?
    • About Chainge
      • 🥇Executive Board
      • 📈Performance Metrics
      • ⛓️Integrated DEXs, Aggregators, and Blockchains
  • 🟡Getting Started
    • 🧭Navigating the Chainge dApp
    • ▶️Video Walkthroughs
    • 🏦Chainge Wallet
  • 🟡Technology
    • 📄Overview
    • 🔺Key Differentiators
    • 🛡️Security
      • 🧩How DCRM Works
  • 🟡Core Features
    • 🔀Cross-Chain Swaps
    • 🌉Bridge To Everywhere
    • 🔑Self-Custodial Wallet
    • ⏱️Limit Orders
    • 🤖AI-Powered Features (Coming Soon)
  • 🟡Governance
    • 🏛️Chainge DAO
  • 🟡Economics
    • 🪙Token (XCHNG)
      • 🛠️Utilities and Functions
      • 📊Tokenomics
      • 🔼Staking
      • 💵Profit Share
  • 🟡Developer Tools
    • 📃Chainge 2.0 API Documentation
      • 🟡Get Chains and Tokens
      • 💲Get Price Quote API
      • 🔗Aggregate Swap
      • 📝Submit order
      • 🎟️Submit Ticket
      • Submit order by Kaspa
      • 💻Github Examples
      • 💰Fee Channel
      • ⚡Earn feature API
    • 📖Knot.meme API Document
      • Get KRC20 Tickers
      • Base API
      • Core API
  • 🟡Official resources
    • 📂Github repositories
    • 🌐Social networks
Powered by GitBook
On this page

Was this helpful?

  1. Technology
  2. Security

How DCRM Works

PreviousSecurityNextCross-Chain Swaps

Last updated 9 months ago

Was this helpful?

DCRM uses sharded private keys, where each key is split into multiple parts and spread across the network. In doing so, the components to fully reconstruct the full private key are never in one place. Key shards are generated and stored independently by different nodes, so even if one node is compromised, the private key is still safe.

The heart of DCRM is Multi-Party Computation (MPC) and Threshold Signature Scheme (TSS). MPC allows multiple parties to jointly compute a function using their independent inputs while keeping those inputs private from the others involved in the process. TSS allows a group of parties to sign a transaction together, where only a subset of the group is required to sign.

DCRM is secured by its distributed key generation. Unlike traditional methods where a private key is generated and then split, DCRM generates key shards from the start. This eliminates the risk of the full private key being exposed at any point. When signing a transaction FUSION (yellow paper ) nodes validate the transaction using their key shards without ever assembling the full private key.

DCRM also uses a Lock-in, Lock-out (LiLo) design for funds across multiple blockchains like Bitcoin and Ethereum. The process involves multiple nodes in consensus, each generating and storing a part of the private key. Virtual node groups holding key shards ensure the availability and security of these shards. The algorithm governing the formation of these groups ensures the probability of simultaneous offline nodes is extremely low.

🟡
🛡️
🧩
here