Close Menu
Chain Tech Daily

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Coinbase breach strikes PayPal Mafia royalty, Sequoia boss

    May 17, 2025

    New Zealand man caught in FBI-led probe

    May 17, 2025

    NFT sales jump 17%, Newcomer collection boasts 470% spike

    May 17, 2025
    Facebook X (Twitter) Instagram
    Chain Tech Daily
    • Altcoins
      • Litecoin
      • Coinbase
      • Crypto
      • Blockchain
    • Bitcoin
    • Ethereum
    • Lithosphere News Releases
    Facebook X (Twitter) Instagram YouTube
    Chain Tech Daily
    Home ยป Validated, staking on eth2: #4 – Keys ๐Ÿ”‘
    Ethereum

    Validated, staking on eth2: #4 – Keys ๐Ÿ”‘

    Olivia MartinezBy Olivia MartinezFebruary 10, 20256 Mins Read
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Special thanks to Sacha Yves Saint-Leger & Danny Ryan for their review.

    At the core of every Proof of Stake system is a signature scheme. Signatures are used to verify the identity of each validator allowing their actions, both good and bad, to be attributed to them.

    We can verify honesty by looking at a validator’s signed messages and we can prove malice by showing messages that violate the rules of consensus.

    In fact, in eth2, the identity of a validator is their public key. Specifically, each validator has two sets of keys: a signing key and a withdrawal key.

    Signing keys

    A signing key is the key a validator needs to sign attestations and propose blocks. Because a validator needs to sign a message at least once per epoch, the client software must have custody of the key.

    Withdrawal keys

    Because the client software is always connected to the internet, there is of course a chance that oneโ€™s signing key is compromised. To reduce the impact of such a breach, the actions a validator can perform are split between two keys.

    The signing key, as explained above, is used for the validator to perform their duties. On the other hand, the withdrawal key has the power to control a validator’s funds (transferring*, and withdrawing* ETH).

    A validator should only need to use their withdrawal keys a few times over the lifetime of being a validator. This means they can be put into cold storage and stored with a high degree of security (offline).

    * Transfers and withdrawals are not enabled until at least phase 1

    That’s a lot of keys!

    If for every 32ETH staked, one needed to save and use 2 unrelated keys to make a deposit, this would get out of hand very quickly.

    Luckily, we have a solution. The remedy is to have the keys use a common secret, so that storing a single secret gives access to multiple keys.

    In eth2, this is achieved via EIPs 2333 and 2334: a set of standards that describe how withdrawal and signing keys are related, and how they can be derived from a single mnemonic.

    Mnemonics

    Mnemonics are another way of encoding secrets and are a much simpler means for people to store and back up their private keys.

    The idea being that it is simpler to remember or write down sausage solution loud isolate focus glide frame door clown million shuffle impulse than 0x1e9f2afcc0737f4502e8d4238e4fe82d45077b2a549902b61d65367acecbccba without making any mistakes.

    Deriving keys from other keys

    When interacting with wallets, you may have encountered “paths” of the form m/44’/60’/0’/0/0. These paths describe a relationship between keys.

    According to EIP 2333, this relationship takes the form of a tree structure in which a key is determined by a source of entropy (the treeโ€™s seed) and a tree path.

    We use the seed to calculate the root of the tree and then build the tree in layers on top of this root. This tree of keys is defined purely through the relationship between the branch followed in the tree, and the tree’s root.

    In practical terms, it allows us to find any key in the tree by starting at the root, and calculating the intermediate key at each branch we follow, until we reach the leaf we are interested in.

    A wonderful consequence of this is that we can start with a single source of entropy (a mnemonic, for example), and from there build out a practically unlimited number of keys.

    In addition, by securely storing just the mnemonic, you have a backup of every key that your validator uses.

    This idea is used in eth2 to allow a single mnemonic to generate as many keys as a validator needs. For example, if you wanted to run 3 validators, you could use a single mnemonic to generate the withdrawal keys located at
    m/0,
    m/1,
    m/2.

          [m / 0]
         /
        /
    [m] - [m / 1]
        \
         \
          [m / 2]
    

    Each branch is separated by a / so m/2 means start with the master key and follow branch 2.

    EIP 2334 states that the validator’s signing key is the 0th child-branch of the withdrawal key. In practice this means that, when the standard is followed, if you know the private key for withdrawal, you can calculate the corresponding private key for signing.

    Continuing with the above example, the signing keys would be found at:
    m/0/0,
    m/1/0,
    m/2/0.

          [m / 0] - [m / 0 / 0]
         /
        /
    [m] - [m / 1] - [m / 1 / 0]
        \
         \
          [m / 2] - [m / 2 / 0]
    

    While we tried to keep this example as simple as possible, in practice the paths involved are a little longer (EIP 2334 requires using m/12381/3600/i/0, and m/12381/3600/i/0/0 for withdrawal and signing keys respectively). Nevertheless, the logic remains the same.

    The important thing to remember is that if you know the mnemonic, you can calculate your withdrawal keys, and from there derive your signing keys.

    Storing keys

    Validator clients use keystores as a method for exchanging keys.

    Keystores are files that contain private keys encrypted with a user’s password. They can be safely stored and transferred between computers provided the password is not stored on the same computer.

    When you are ready to start validating, you can give your client the keystores and the password encrypting them (it needs both pieces of information to import your keys).

    Becoming a validator

    The first step in becoming a validator is to generate the appropriate keys. These will be generated once you’ve written down your mnemonic.

    Since there are no withdrawals or transfers in phase 0, you do not need to have keystores for your withdrawal keys; storing your mnemonic safely is sufficient.

    As your validator clients need your signing keys, you will receive a keystore for each of your validators to store these keys.

    Now it’s deposit time! To become a validator, you will need to send 32 ETH per validator in addition to your deposit data containing all of your validator public keys.

    The deposit data are then recorded in the deposit contract on eth1. This contract is watched by eth2 nodes who are responsible for copying over the deposit data. Once your deposit data has been copied over, you are now officially a validator!

    Becoming a validator the easy way

    We’re happy to announce that we’ve been working hard on a friendly interface to walk validators through this process. Stay posted for an update shortly on what the Eth2 Launchpad is and how to use it!



    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Olivia Martinez

    Related Posts

    Ethereum May 14, 2025

    Bitwise CIO bats for diversified crypto investment, compares Bitcoin to Google

    Ethereum May 14, 2025

    โ€œV1.0 Announcing the Trillion Dollar Security Initiativeโ€

    Ethereum May 8, 2025

    Ethereum (ETH) sees major uptick as Pectra upgrade goes live

    Ethereum May 8, 2025

    Allocation Update – Q1 2025

    Ethereum May 7, 2025

    CVE-2025-30147 – The curious case of subgroup check on Besu

    Ethereum May 6, 2025

    Dogecoin faces $500 million liquidation test as price eyes $0.2 recovery

    Leave A Reply Cancel Reply

    Don't Miss
    Crypto May 17, 2025

    Coinbase breach strikes PayPal Mafia royalty, Sequoia boss

    Sequoia Capital Managing Partner Roelof Botha was among the high-profile victims whose personal information was…

    New Zealand man caught in FBI-led probe

    May 17, 2025

    NFT sales jump 17%, Newcomer collection boasts 470% spike

    May 17, 2025

    Tether tightens grip as stablecoin market cap hits $243b

    May 17, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • YouTube
    • LinkedIn
    Our Picks

    Coinbase breach strikes PayPal Mafia royalty, Sequoia boss

    May 17, 2025

    New Zealand man caught in FBI-led probe

    May 17, 2025

    NFT sales jump 17%, Newcomer collection boasts 470% spike

    May 17, 2025

    Tether tightens grip as stablecoin market cap hits $243b

    May 17, 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Don't Miss
    Crypto May 17, 2025

    Coinbase breach strikes PayPal Mafia royalty, Sequoia boss

    Sequoia Capital Managing Partner Roelof Botha was among the high-profile victims whose personal information was…

    New Zealand man caught in FBI-led probe

    May 17, 2025

    NFT sales jump 17%, Newcomer collection boasts 470% spike

    May 17, 2025

    Tether tightens grip as stablecoin market cap hits $243b

    May 17, 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    About Us
    About Us

    ChainTechDaily.xyz delivers the latest updates and trends in the world of cryptocurrency. Stay informed with daily news, insights, and analysis tailored for crypto enthusiasts.

    Our Picks

    For Many Women, The Pain Of The Pandemic Led To Stronger Friendships

    January 15, 2020

    How A ‘Healthy’ Lifestyle Can Be Making You Tired

    January 15, 2020

    Fashion Influencers To Follow On Instagram In 2021

    January 15, 2020
    Lithosphere News Releases

    Colle AI Optimizes Bitcoin Utility to Improve Multichain NFT Distribution

    May 16, 2025

    Atua AI Refines Multichain Operations for Enterprise Adaptability

    May 16, 2025

    Colle AI Expands XRP Cryptocurrency Use to Power NFT Interoperability

    May 15, 2025

    Atua AI Elevates Bitcoin Infrastructure to Enhance AI Workflow Security

    May 15, 2025
    X (Twitter) Instagram YouTube LinkedIn
    © 2025 Copyright

    Type above and press Enter to search. Press Esc to cancel.