1. Decentralized private key generation – Multiple Enigma nodes locally create a segment of
the key, whereas the full key is only ever assembled by the user. No trail of evidence is left
anywhere.
2. Decentralized transaction signing – Transactions signed without ever exposing the private
key or leaving a trail.
3. Decentralized controls - Set spending limits, multi-sig, CHECKLOCKTIMEVERIFY like
controls, and more with a private script. Lock time,
OK, so the secret can be generated in decentralized fashion. From reading this, I can't tell if the secret is only obtainable at the client, or does this mean that the enigma network could in effect store the pieces of the key and re-assemble it based on some pre-agreed computation that is not subject to modification by any particular user?
(Enigma here). Yes, that is possible. You can distribute a key to the nodes and make it retrievable only if some computation is satisfied (which is also done privately and leaks no information).
We have some ideas on how to do it, but we're hoping gifted developers out there would use our platform to develop such highly-needed applications (that would probably be much better than what we have in mind).
8.10 Bitcoin Wallet
1. Decentralized private key generation – Multiple Enigma nodes locally create a segment of the key, whereas the full key is only ever assembled by the user. No trail of evidence is left anywhere.
2. Decentralized transaction signing – Transactions signed without ever exposing the private key or leaving a trail.
3. Decentralized controls - Set spending limits, multi-sig, CHECKLOCKTIMEVERIFY like controls, and more with a private script. Lock time,