Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You have a secret key to access your crypto assets in your company, and you want to share among 3 people, yourself (CEO), your CFO,

You have a secret key to access your crypto assets in your company, and you want to share among 3 people, yourself (CEO), your CFO, and your Treasurer. To achieve this goal, you decide take your secret and cut it into three equal non-overlapping parts to give to each of the there people.

Which of the following would be the downsides of this scheme?

image text in transcribed

QUESTION 1 You have a secret key to access your crypto assets in your company, and you want to share among 3 people, yourself (CEO), your CFO, and your Treasurer. To achieve this goal, you decide take your secret and cut it into three equal non-overlapping parts to give to each of the there people Which of the following would be the downsides of this scheme? If one of the three goes rogue or loses the secret, you lose ability to access to your assets An attacker can steal any one secret and get access to your assets. An attacker gains information about your private key material from stealing any one secret, reducing brute force attack space The access key has to be reconstituted in one place to sign any transactions or decrypt data, and is vulnerable to compromise at that time. Secret information must be somehow securely communicated to multiple parties. QUESTION 1 You have a secret key to access your crypto assets in your company, and you want to share among 3 people, yourself (CEO), your CFO, and your Treasurer. To achieve this goal, you decide take your secret and cut it into three equal non-overlapping parts to give to each of the there people Which of the following would be the downsides of this scheme? If one of the three goes rogue or loses the secret, you lose ability to access to your assets An attacker can steal any one secret and get access to your assets. An attacker gains information about your private key material from stealing any one secret, reducing brute force attack space The access key has to be reconstituted in one place to sign any transactions or decrypt data, and is vulnerable to compromise at that time. Secret information must be somehow securely communicated to multiple parties

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Broken Markets A Users Guide To The Post Finance Economy

Authors: Kevin Mellyn

1st Edition

1430242213, 978-1430242215

More Books

Students also viewed these Finance questions