DeFi Mall
  • 1️⃣Background Overview
    • 1.1 Background Overview
    • 1.2 Blockchain and the New Financial System
    • 1.3 Decentralized Finance Continuously Empowering
    • 1.4 The Birth of DeFi Mall
  • 2️⃣DEFIMALL Aggregate Trading Platform Overview
    • 2.1 The Core of DeFi Mall
    • 2.2 DeFi Mall's design goals
    • 2.3 DeFi Mall's development philosophy
    • 2.4 DeFi Mall transaction aggregation solution
  • 3️⃣DEFIMALL basic module
    • 3.1 Wallet system
    • 3.2 Asset registration and transaction
    • 3.3 Node record query
    • 3.4 DeFi project audit
    • 3.5 Ecological information
    • 3.6 DEX Data Visualization
    • 3.7 Full cross-chain transaction aggregation
  • 4️⃣DEFIMALL Technical system
    • 4.1 Decentralized system management
    • 4.2 Consensus mechanism
    • 4.3 Transaction structure
    • 4.4 Composite Key
    • 4.5 timestamp
    • 4.6 Attachments and contract bytecode
    • 4.7 Hard forks, specifications, and dispute resolution
    • 4.8 Technical characteristics
  • 5️⃣Design of DFM token model
    • 5.1 Economic model of DFM
  • 6️⃣Global team
    • 6.1 Technical Team
  • 7️⃣Global governance structure
    • 7.1 Global governance structure
Powered by GitBook
On this page
  1. DEFIMALL Technical system

4.4 Composite Key

The term "public key" in the above description actually refers to a type of composite key. A composite key is a tree structure whose leaves are conventional cryptographic public keys accompanied by an algorithm identifier. Nodes within the tree specify the weight of each of its child nodes and a weighted threshold that must be reached. The validity of a set of signatures can be verified by summing the weights of all keys with valid signatures in the tree, from bottom to top, and comparing this sum to the threshold. By using weights and thresholds, a variety of scenarios can be encoded, including boolean expressions using AND and OR.

Composite keys are useful in multiple scenarios. For instance, an asset can be under the control of a composite key: one key belongs to a user, another to an independent risk analysis system. When a transaction appears suspicious, such as transferring too much value in a very short time window, the risk analysis system may refuse to sign the transaction. Another example involves encoding cooperative structures into keys, allowing a CFO to sign a large transaction alone, while their subordinates would need to sign together. Composite keys are also very useful for notary services.

In a distributed notary service, each participant is represented by a leaf of the tree, and specific threshold settings can make the group's signature valid even if some participants are offline or refuse to sign. Although literature exists on threshold signature schemes that can precisely generate composite keys and signatures, to allow the mixing of keys using different algorithms, a less space-efficient explicit form has been chosen. This approach avoids the need for all participants in a group to upgrade simultaneously while phasing out old algorithms and adopting new ones.

Last updated 1 year ago

4️⃣