Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You have a secret key to access your crypto assets in your company, and you want to share among 3 people, yourself (CEO), your CFO,
You have a secret key to access your crypto assets in your company, and you want to share among 3 people, yourself (CEO), your CFO, and your Treasurer. To achieve this goal, you decide take your secret and cut it into three equal non-overlapping parts to give to each of the there people.
Which of the following would be the downsides of this scheme?
QUESTION 1 You have a secret key to access your crypto assets in your company, and you want to share among 3 people, yourself (CEO), your CFO, and your Treasurer. To achieve this goal, you decide take your secret and cut it into three equal non-overlapping parts to give to each of the there people Which of the following would be the downsides of this scheme? If one of the three goes rogue or loses the secret, you lose ability to access to your assets An attacker can steal any one secret and get access to your assets. An attacker gains information about your private key material from stealing any one secret, reducing brute force attack space The access key has to be reconstituted in one place to sign any transactions or decrypt data, and is vulnerable to compromise at that time. Secret information must be somehow securely communicated to multiple parties. QUESTION 1 You have a secret key to access your crypto assets in your company, and you want to share among 3 people, yourself (CEO), your CFO, and your Treasurer. To achieve this goal, you decide take your secret and cut it into three equal non-overlapping parts to give to each of the there people Which of the following would be the downsides of this scheme? If one of the three goes rogue or loses the secret, you lose ability to access to your assets An attacker can steal any one secret and get access to your assets. An attacker gains information about your private key material from stealing any one secret, reducing brute force attack space The access key has to be reconstituted in one place to sign any transactions or decrypt data, and is vulnerable to compromise at that time. Secret information must be somehow securely communicated to multiple partiesStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started