Security
Last updated
Last updated
In the DHT ecosystem, every user has a main account and several sub accounts. The DIGITAL - HI TECH (DHT) ID acts as a link, connecting reputation and asset data across different applications and building a complete user reputation profile image.
DIGITAL - HI TECH (DHT), based on Hash Message Authentication Code (HMAC) 16 algorithm, creates sub-accounts using the master account.
The formula for HMAC is as follows:
K is the primary account key, m is the substring ID, both opad and ipad are concrete constants. The private key of each sub-account is generated by the primary account's private key and the corresponding sub-chain ID, allowing the master account to control the sub-accounts per application:
• Master Key Control: To generate and obtain the private key of the subchain account, the user needs to simultaneously use the private key, identity verification code and subchain ID of the respective master account. This ensures the security of the private key for the subchain accounts.
• Unconnectable: Under asymmetric encryption protection, regardless of the main or secondary chain, accounts on each chain cannot be linked back, thus ensuring the anonymity of the information on the chain.
DHT's HMAC has the following advantages over HD's BTC wallet:
• Variable address length and higher security
DIGITAL - HI TECH (DHT) uses SHA3's SHAKE256 algorithm (SHAKE = SHA + keccak )17 to hash public keys, making it possible to change the output address length, while achieving better performance and high security than.
• Lower computational cost
HD wallets need a large number of secondary private keys to locate the sub-account address. With DIGITAL - HI TECH (DHT), secondary private keys are optional because Private Seed connects the primary account address to the addresses of the sub-accounts, significantly reducing storage and computation costs.
In addition, DIGITAL - HI TECH (DHT) applies secure multi-party computation, ring signatures, and other measures to protect user ID information, minimizing the risk of data abuse and leakage.