TransferChain Docs
  • Introduction to TransferChain
    • Why TransferChain
    • Who is using TransferChain
    • About
  • Client & SDKs
    • Getting Started
      • Introduction to TransferChain SDKs
      • FAQ
    • Python
    • Go
    • Javascript
    • TransferChain SDK Standard
    • Prerequisites
  • CLI
    • About
    • Quickstart
    • Using TransferChain CLI
      • Initialize
      • Storage
      • Blockchain
    • Authentication and Access Credentials
    • Prerequisites
  • Core Concepts
    • Understanding TransferChain
    • Cryptography
      • Authentication & Authorization
      • Encryption
      • Elliptic-Curve
      • Address Generation
    • Blockchain
      • Decentralization
      • Architecture
    • gRPC
    • Data Distribution
    • Immutability
    • Data Redundancy
    • Multi Region Availability
    • Secure Messaging
    • Overview of TransferChain System Components
  • Management & Roles
    • TransferChain Management Portal
    • User Roles
  • Billing & Payment
    • Developer Plan
  • Resources
    • Blog
    • Support Center
    • Knowledge Base
    • Community
Powered by GitBook
On this page
  1. Core Concepts
  2. Cryptography

Elliptic-Curve

Use of Elliptic Curve Cryptography at TransferChain

PreviousEncryptionNextAddress Generation

Last updated 1 year ago

Choice of an Elliptic Curve

The only restriction that the underlying proxy re-encryption scheme cryptosystem imposes on the choice of an elliptic curve is that it should generate a group of prime order, since we need to compute inverses modulo the order of this group. In the underlying setting of the proxy re-encryption scheme, we use the secp256k1 curve since it fulfills this latter requirement and is widely used in the blockchain ecosystem; we are exploring other curve choices that could improve performance.