Position: Home page » Virtual » What is virtual currency public key private key

What is virtual currency public key private key

Publish: 2021-05-07 11:28:50
1. In order to make it easier for new people to understand, sister coin will use some metaphors. Although she is not strict, she will understand better
the private key is like your bank card password
the address of bitcoin wallet is like your bank card
as long as you have the bank card and password, anyone can withdraw money from ATM
the address of bitcoin wallet is public, which means that everyone else has your bank card, so your bank card password (private key) becomes very important at this time
once your key is disclosed, others can transfer your bitcoin

Internet search: "sister coin teaches you bitcoin" or "sister coin" find me, share more exquisite content ~!
2. I'll give you my address (address). You can find my zip code (public key). You can write to me with my zip code (public key) + address. The mail will be sent to my mail cabinet. I'll open the mail cabinet (private key) with the key I have. The key of express cabinet is stored in my wallet (wallet)
1. The mail cabinet is stolen (the database is stolen)
2. The key is stolen (the private key is stolen)
3. Knowing my home address (the public key is stolen), the lock of the mail cabinet is opened violently (the private key is cracked violently).
3. The private key is your bank card password, and the address is your bank account number, but the private key is more important. With the private key, you can push out the address. If you forget the private key, you will lose everything. The signature is personalization, plus a verification procere. The wallet is a small ATM, which can be sent after the update. If the wallet file is saved, it will be OK. BTC China is OK, and you can buy money.
4. Public private key is peer-to-peer encryption. You can see RSA encryption

only the private key can decrypt the content encrypted by the private key
only the public key can decrypt the content encrypted by the private key
here, the public key is your bitcoin ID, and the private key is your wallet

when using bitcoin, you should take care of your wallet, and you'd better encrypt it with a password, You can use your bitcoin

there are many bitcoin trading platforms on the Internet, and you can find a lot of them by Google search
generally, you need to mine bitcoin, and there are also mining platforms on the Internet, but now the income is low, and the display card is burned
5. I'll give you my address (address). You can find my zip code (public key). You can write to me with my zip code (public key) + address. The mail will be sent to my mail cabinet. I'll open the mail cabinet (private key) with the key I have
1. The mail cabinet is stolen (the database is stolen)
2. The key is stolen (the private key is stolen)
3. Knowing my home address (the public key is stolen), the mail cabinet lock is opened violently (the private key is cracked violently).
6. I know that,
7.

Many small white just admission, was the private key, public key, address, and other relations confused. Some of them even lost their private key. They had money on the address, but they just couldn't get it out. Today, Xiao will try to figure out the relationship between the private key, the public key and the address

The relationship among

private key, public key and address is as follows:

the private key is converted into (generated) public key, and then converted into address. If there is bitcoin or integrity coin on an address, you can use the private key converted into this address to spend the above integrity coin. The generation of public key and address depends on private key, so private key is the most important

The same is true for mobile phone wallet, but the file management method of mobile phone is not as convenient as that of computer. Therefore, the general mobile wallet will provide a function called or similar to "export private key". Through this function, the private key can be exported in various forms

for example, bitcoin mobile wallet can be exported as a two-dimensional code, which can be printed or scanned on paper. When replacing a mobile phone, install a bitcoin wallet and scan the QR code to migrate bitcoin. Bitcoin mobile wallet and trustcoin mobile wallet can be exported as a clear text string and printed on paper - this is paper wallet

paper wallet allows users to spend your bitcoin or trustcoin at any terminal with bitcoin or trustcoin wallet

the loss or damage of the wallet will lead to the loss of the private key, thus completely losing the transfer right of the digital currency. To prevent such tragedies, you should always back up the data in your wallet. In addition to the address, all the private keys are saved ring the backup

summary

1, the private key should be well protected to prevent loss and forgetting. When the mobile phone clears the information, it is best to it by hand, but do not disclose it

2, you should prevent your wallet from being lost or damaged, resulting in the loss of your private key and the right to transfer in digital currency. Otherwise, you can't take out more than one currency, which is not useless

8. The public key can be widely spread, even stored in the public key database for other Internet users to consult. Private keys belong to personal information and should never be disclosed to others
public key and private key interact to encrypt and decrypt data. Data encrypted by public key can only be decrypted by private key, and data encrypted by private key can only be decrypted by one public key. In this way, double authentication can be realized
before sending the key information to the designated person, the user first uses the public key of the user to encrypt the information. Because only the user's private key can be used to decrypt the sent information, it ensures that other people without private key will not decrypt the information
in addition, users can use their private key to encrypt information and send it to many people. Because only the sender's public key can be used to decrypt the received information, so that the receiver can be sure that the information really came from someone.
9. 1、 Public key encryption
suppose I find two strings of numbers, one is 1 * and the other is 2 *. I like the number 2 * and I will keep it. I won't tell you (private key). Then I will tell you that 1 * is my public key
I have a file that I can't let others see, so I use 1 * to encrypt it. Someone else found this file, but he didn't know that 2 * was the private key for decryption, so he couldn't decrypt it. Only I could decrypt it with
string 2 *, which is my private key. So I can protect the data
my good friend x encrypts the character a with my public key 1 * and then it becomes B, which is put on the Internet. Other people steal this file, but they can't open it, because they don't know that 2 * is my private key,
only I can decrypt it and get a after decryption. In this way, we can transmit encrypted data<

Second, private key signature
If I encrypt a piece of data with the private key (of course, only I can encrypt with the private key, because only I know 2 * is my private key), as a result, all people will see my content, because they all know that
my public key is 1 *, then what is the use of this encryption
but my good friend x said that someone pretended to write to him. What shall I do? I encrypt the content of the letter I want to send with my private key 2 * and send it to X. then I tell him to decrypt it to see if it is C. He decrypted it with my public key 1 * and found that it was c
at this time, he will think that the data that can be decrypted with my public key must be encrypted with my private key. Only I know my private key, so he can confirm that it's really something I sent
in this way, we can confirm the identity of the sender. This process is called digital signature. Of course, the specific process is a little more complicated. The purpose of encrypting data with private key is digital signature
summary: public key and private key are paired, they decrypt each other
public key encryption and private key decryption
private key digital signature, public key verification.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750