Advanced Models of ID-Wallet
Last updated
Last updated
The THXNET. ecosystem supports several sophisticated wallet configurations that extend the functionality of the standard ID-Wallet, enabling enhanced security, distributed control, and specialized asset management capabilities. These advanced implementations address diverse operational requirements across both individual and organizational use cases.
The Multi-Signature (MultiSig) framework enables multiple independent ID-Wallets to form a collaborative governance committee with configurable consensus parameters. When establishing a MultiSig configuration, participants define both the total membership count and the minimum approval threshold required for transaction authorization (e.g., 50% consensus requirement).
This collaborative structure generates a distinct off-chain MultiSig Wallet with its own unique ID-Wallet address. This entity can independently hold and manage various digital assets, including fungible tokens and NFTs. All governance actions executed by the MultiSig Wallet require internal committee consensus through a structured multi-party signature process, ensuring distributed authorization for all asset management operations.
The Proxy Wallet functionality establishes delegated operational relationships between wallet entities. An ID-Wallet can be designated as a proxy for an external cold wallet, enabling the ID-Wallet to conduct blockchain operations on behalf of the cold wallet for a specified duration. Conversely, an external cold wallet can be registered as a proxy for an ID-Wallet, transferring operational control of the ID-Wallet's assets to the cold wallet.
Both proxy registration and revocation processes are implemented through standardized API operations, providing flexible authorization management while maintaining comprehensive security controls throughout the delegation lifecycle.
The Multi-Party Computation (MPC) Wallet extends collaborative security through advanced cryptographic methodologies. Multiple ID-Wallets can collectively establish and share control of a specialized MPC Wallet through distributed key generation processes. Unlike the MultiSig approach, executing transactions through an MPC Wallet requires the offline aggregation of partial signatures from multiple participating ID-Wallets to construct a valid blockchain transaction with complete signature authorization.
Each participating ID-Wallet maintains custody of only a fragment of the complete MPC private key. This architecture delivers superior security through information distribution while enabling sophisticated key recovery mechanisms through fragment recombination and error correction protocols should restoration become necessary.
THXNET. implements the Elliptic Curve Integrated Encryption Scheme (ECIES) to enable advanced privacy controls for NFT assets. When an organization on Layer 1 mints an NFT, sensitive portions of the metadata can be encrypted using the intended holder's ID-Wallet public key. This cryptographic approach ensures that only the legitimate holder can decrypt and access sensitive information contained within the NFT metadata using their corresponding ID-Wallet private key.
This implementation delivers granular privacy management for confidential information while preserving the benefits of public blockchain verification for ownership and transfer operations.
ID-Wallet supports multiple cryptographic signature algorithms including sr25519, ed25519, and secp256k1 (Ethereum standard), resulting in different address representations for the same underlying wallet. This multi-algorithm compatibility substantially enhances interoperability between THXNET. and diverse external blockchain ecosystems.
This multi-algorithm cryptographic framework serves as the technical foundation for THXNET.'s technology, enabling secure cross-chain asset locking and transfer operations that are essential for the platform's . By maintaining cryptographic integrity across heterogeneous blockchain environments, Bifrost creates a seamless bridge between utility and trading tokens while preserving the distinct advantages of each ecosystem.