Professional Documents
Culture Documents
Digital Asset Data - Part II Webinar
Digital Asset Data - Part II Webinar
Digital Asset Data - Part II Webinar
COM
Levels 1, 2
Your hosted blockchain infrastructure.
CONFIDENTIAL 4
Unbound Tech
MPC - How does it work?
Enterprise Grade MPC • Multiple machines jointly compute a
function while keeping their inputs
private
• Security guarantee –
mathematically proven
Unbound MPC
• Multi-Party (# the common two
party)
• Shares are refreshed continuously
• Flexible policies
Robust Cryptographic Platform
• Approvers hold only key shares.
• Crypto agile
Nodes
MPC based • Distributed policy validation
OTC Secure
Custody Trading Public
Transfers
Blockchain
Secure Clearing Enterprise Identity
and Settlement Blockchain Management
Private /
Consortium
Axoni R3 Corda Quorum Hyperledger Blockchain
9
Securing Digital Assets - Technologies
HSM Multi-sig
A hardware security module (HSM) is a Multi-signature refers to more than one key
physical computing device that (1) to authorize a digital asset transaction.
safeguards and (2) manages digital • Usually 2of3.
keys for strong authentication and • Ledger Specific.
provides crypto-processing.
Open API × ×
Ledger agnostic × ×
Platform agnostic × ×
Multi layer security architecture: × ✓
- Credentials based segregation
- Software Stack segregation
- Device based segregation
You need 2 parties at least to restore the backup × ✓
HSMs keep keys in their full format. One can The backup key is either held by the user or a key
key steal / misuse the backup key to restore data. recovery service.
Regulator-ready reporting × ✓
Low TCO × ✓
Effort Associated with Cryptographically-enforced policy controls
Co-Managed custody ✓ ✓
Majority / Minority of the keys at the vendor's control
Noncustodial × ✓
Investor holds the signing key and the backup key
PoS assets × ×
Tokenization of assets Requires customization Requires customization
Scaling Blockchain Applications
Samuel Sutch
CTO @ BRD
sam@brd.com
CONFIDENTIAL 15
Scaling Blockchain Applications
CONFIDENTIAL 16
Scaling Blockchain Applications:
Workloads
CONFIDENTIAL 17
Common Existing Solutions
CONFIDENTIAL 18
Scaling Blockchain Applications:
Existing Solutions
Node Hosting
✔ Broad protocol support
✔ High write capacity potential
Most expensive option
Difficult operations
Low read capacity potential
Hard to scale
CONFIDENTIAL 19
Scaling Blockchain Applications:
Existing Solutions
Block Explorers
✔ Cost effective
✔ High read and write capacity potential
Most solutions not ready for scale
Limited protocol support
Reliability + data integrity issues
Vendor lock-in
CONFIDENTIAL 20
Common Requirements
CONFIDENTIAL 21
Scaling Blockchain Applications:
Requirements & Tools
Requirement Node Hosting Block Explorers
Performance optimized No No
Client/server integration No No
CONFIDENTIAL 22
Scaling Blockchain Applications:
Requirement Blockset
CONFIDENTIAL 23
blockset.com
CONFIDENTIAL 24