HbarSuite Docs
  • Welcome to HbarSuite
  • HbarSuite Developer Documentation
    • HbarSuite Smart Engine Applications
      • @hsuite/cross-chain-exchange
      • @hsuite/dao
      • @hsuite/exchange
      • @hsuite/launchpad
      • @hsuite/multisig
      • @hsuite/nft-exchange
    • HSuite Libraries
      • @hsuite/api-key
      • @hsuite/auth-types
      • @hsuite/auth
      • @hsuite/client-types
      • @hsuite/client
      • @hsuite/dkg-types
      • @hsuite/hashgraph-types
      • @hsuite/health
      • @hsuite/helpers
      • @hsuite/ipfs
      • @hsuite/smart-config
      • @hsuite/smart-network-types
      • @hsuite/smart-transaction-types
      • @hsuite/smartnode-sdk
      • @hsuite/snapshots
      • @hsuite/subscriptions-types
      • @hsuite/subscriptions
      • @hsuite/throttler-types
      • @hsuite/throttler
      • @hsuite/users-types
      • @hsuite/users
      • @hsuite/validators-types
  • General Documentation
    • Tokenomics
      • Tokenomics v1
      • Tokenomics V2
    • Smart Apps and Interaction
      • Subscription-Based Model
      • Token-Gate Model
    • The Smart Node Network
      • security-layer
        • Security Layer Integration
        • Setting Up Secure Clusters
        • Generating and Sharing Keys Collaboratively
        • Protecting Secrets with Shamir's Method
        • Managing Cluster Membership
        • Handling Node Expulsion and Replacement
        • Automating Responses to Network Changes & Key Rotation
        • Ensuring Continuous Operation and Recovery
      • Understanding Validators in Our System
        • Type of Validators Explained
    • What is a Smart Node?
  • Restful APIs Documentation
Powered by GitBook
On this page
  • Distributed Key Generation (DKG)
  • Sharing Key Parts Securely
  • Benefits of Collaborative Key Management
  1. General Documentation
  2. The Smart Node Network
  3. security-layer

Generating and Sharing Keys Collaboratively

Distributed Key Generation (DKG)

The Smart Node Network employs a sophisticated distributed approach to key management:

  • Instead of relying on a single key holder, the cluster collaborates to create and manage cryptographic keys.

  • This ensures that no single node has full control over the keys, making unauthorized access more difficult.

Sharing Key Parts Securely

Our key distribution system follows these core principles:

  1. Key Splitting

    • The generated keys are split into smaller, manageable parts

    • Each part is essential but incomplete on its own

    • Uses advanced cryptographic techniques to ensure security

  2. Distribution Process

    • Each node in the cluster receives a portion of the key

    • The complete key is never held by one entity alone

    • Requires collaboration for key reconstruction

  3. Security Measures

    • All key parts are encrypted during transmission

    • Each node validates the authenticity of received key parts

    • Regular rotation of key shares enhances security

Benefits of Collaborative Key Management

  • Enhanced Security: No single point of compromise

  • Fault Tolerance: System remains operational even if some nodes fail

  • Auditability: All key operations are logged and verifiable

  • Scalability: Easy to add or remove nodes from the key sharing process

PreviousSetting Up Secure ClustersNextProtecting Secrets with Shamir's Method

Last updated 4 months ago

Key Distribution