DPSN: Decentralised Pub/Sub Network
  • Introduction
  • Why Decentralized?
  • Understanding Topics
  • Architecture
    • Topics Registry
    • Configurator
    • Clusters
    • Publishers and Subscribers
    • Facilitator Brokers
    • SDK
  • Functionality
    • Message Publishing and Delivery
    • Subscription Management
    • Security Considerations
    • Topic Ownership and Access Control
    • Private Key Authentication
    • Fully Homomorphic Encryption Support
  • Advantages and Use Cases
    • Advantages of DPSN
    • Use Cases
  • Integration
    • SDK Introduction
    • Publisher
    • Subscriber
    • Delegated Addresses
    • Private Messaging
  • Integration Guides
    • Messaging Application
  • Token Use
    • Utility
    • Token Utility Model
  • DIPs
    • DIP1: Stateless Message Routing in DPSN
  • DIP2: Integration of DPSN with Model Context Protocol (MCP)
  • DIP-3: Standardizing DPSN AVS for Enhanced Security and Reliability
Powered by GitBook
On this page
  1. Functionality

Private Key Authentication

Private key authentication is a fundamental security mechanism in DPSN, ensuring the integrity and authenticity of network participants.

Core Functionalities

  • Key Generation: Users generate a pair of cryptographic keys: a public key and a private key.

  • Key Registration: The public key is registered with the network to establish a user's identity.

  • Authentication: Users prove their identity by signing messages or transactions with their private key.

  • Key Management: Users are responsible for securely storing and managing their private keys.

Security Considerations

  • Key Security: Emphasizes the importance of protecting private keys from unauthorized access.

  • Key Recovery: Provides mechanisms for recovering lost or compromised private keys, while maintaining security.

  • Key Rotation: Recommends regular rotation of private keys to mitigate security risks.

Additional Features

  • Multi-signature Authentication: Allows for multiple private keys to be required for authorizing actions, enhancing security.

  • Hardware Security Modules (HSMs): Supports the use of HSMs for storing and managing private keys securely.

By employing robust private key authentication, DPSN safeguards against unauthorized access and ensures the integrity of network operations.

PreviousTopic Ownership and Access ControlNextFully Homomorphic Encryption Support

Last updated 8 months ago