JIC and Private key: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>Doug Williamson
(Link with Just in time page.)
 
imported>Doug Williamson
(Add link.)
 
Line 1: Line 1:
Just In Case.
''Cryptography - crytpoassets (CAs).''
 
Private key is a sophisticated form of cryptography that represents ownership of a user’s crypto-assets (CAs) and facilitates the use of CAs to transact.
 
A private key is an integral aspect of CAs, including Bitcoin and altcoins, and helps to protect a user from theft and unauthorised access to their assets.
 
 
It is the key that is used to sign (authenticate) a transaction.
 
Because of cryptographic technology, private keys cannot easily be derived from public keys and this enables the safe sharing of public CA addresses by participants and verification of transactions involving the public-private  key pair.
 
''Source - A treasurer's guide to opening a crypto wallet - ACT - May 2023 - p19.''
 


== See also ==
== See also ==
* [[Just in case]]
* [[Altcoin]]
* [[Just in time]]
* [[Bitcoin]]
* [[Cryptoassets]]
* [[Crypto wallet]]
* [[Cryptography]]
* [[Cybersecurity]]
* [[Dual key]]
* [[Encryption]]
* [[Information technology]]
* [[Key]]
* [[Public]]
* [[Public key ]]
* [[Public key encryption]]
* [[Public key infrastructure]]
* [[Quantum computing]]
* [[RSA encryption]]
* [[Wallet]]
 
[[Category:The_business_context]]
[[Category:Identify_and_assess_risks]]
[[Category:Manage_risks]]
[[Category:Risk_frameworks]]
[[Category:Risk_reporting]]
[[Category:Cash_management]]
[[Category:Financial_products_and_markets]]
[[Category:Liquidity_management]]
[[Category:Technology]]

Latest revision as of 07:40, 22 June 2023

Cryptography - crytpoassets (CAs).

Private key is a sophisticated form of cryptography that represents ownership of a user’s crypto-assets (CAs) and facilitates the use of CAs to transact.

A private key is an integral aspect of CAs, including Bitcoin and altcoins, and helps to protect a user from theft and unauthorised access to their assets.


It is the key that is used to sign (authenticate) a transaction.

Because of cryptographic technology, private keys cannot easily be derived from public keys and this enables the safe sharing of public CA addresses by participants and verification of transactions involving the public-private key pair.

Source - A treasurer's guide to opening a crypto wallet - ACT - May 2023 - p19.


See also