🛡 How DHC Nodes Ensure Security of Asset Custody?
🔶 Selection of Custody Nodes: A
#BitcoinLayer2 project selects 21 nodes to custody assets, setting a threshold signature at 11 nodes.
🔶 Committee Formation: Using the Ring-VRF algorithm, 21 nodes are randomly chosen from thousands to form a Committee.
🔶 Key Shards Creation: Asset management private keys are split into 21 key shards using MPC, stored in nodes' TEE environments.
🔶 Asset Transfer: When a user needs to transfer assets, 11 nodes from the Committee release the assets using TSS signatures.
🔶 Dynamic and Hidden Features: The Committee's composition changes over time, enhancing security against attacks. Nodes operate in a TEE environment, preventing access to private keys.
🔶 Game Theory Consideration: Node operators stake tokens, discouraging irrational actions like stopping a node.
🔶 Layer 2 Security: DHC, DA, and Forced Exit mechanisms ensure Layer 2 inherits
#Bitcoin 's security features.
Through these measures,
#BoolNetwork guarantees the security of asset custody and resolves cross-chain security issues, ensuring the integrity of assets across Layer 2 networks.
🚀