As we approach the world of blockchain, we will always hear these terms 【Private key】 【Public key】 【Address】 【Signature】. What are these terms that are mentioned every day? What about chaotic relations?
Today, let’s take a brief look at the story of the Cowherd and the Weaver Girl to understand wallet-related terms!
It is said that after the Weaver Girl was brought back to heaven because she violated the rules of the sky, the Queen Mother only allowed them to meet on the seventh day of July every year. They suffered only once a year and could not solve the pain of Acacia. They had to express their thoughts by letter every day.
However, the Weaver Girl was afraid that the letter would be discovered by the Queen Mother, and maybe even the annual meeting would not be allowed. So she thought of a way to hide the letter in a place where only the cowherd could view it.
She first came to the imperial garden of the heavenly court, found a rockery, named one of the small caves as a “wallet” for concealment, and put the letters in it; at the same time, there is such a cave in the world, and the cowboy can receive letters from that cave (similar to Our mail delivery).
In order to protect the information in the wallet, the Weaver uses her pells to transcend a small fairy named “Private Key” to protect her.
To avoid the Queen Mother for the purpose of spellcasting, she can only take it slowly. Finally, it took 64 days to generate a 64-bit string fairy using the encryption algorithm.
Because she especially cherished the opportunity to meet with the Cowherd, and wanted to send the letter every day so that the content of the letter was not discovered by the Queen Mother, she applied a spell called 【Elliptic Curve Encryption】to the private key, adding a guardian deity to him Call it 【Public key】.
Because the private key is relatively different from the other, it is extraordinarily long, and it has the atmosphere of a wallet cave. It is afraid of going out to expose its identity, so it hides in the royal garden, and does not even know the public key. The public key lives with a group of little fairies in the heavenly court.
In order to facilitate the Cowherd to take the letter, the Weaver added an advanced 【Hash algorithm】 spell to the public key to create the 【Address】; the Cowherd can find the location of the letter in the world according to the address and view the content of the letter.
The letters of the Cowherd and the Weaver Girl were frequently transmitted, and the Queen Mother was still suspicious. She sent her eyes and ears to see what the letter was, but she found nothing. Why is this:
First of all, the weaver will use the private key to 【Digital signature】when sending the letter. After the weaver puts the letter in the cave, the public key will also reach the cowboy; the cowboy can not only find the letter based on the address provided by the public key, use the public key to verify that each letter received is sent by the Weaver Girl herself; if you want to reply, the letter is also encrypted by the public key. After seeing the letter, the Weaver Girl uses the private key to decrypt and open the letter. After going back and forth, other people saw the letter in time and knew where the letter was, and they could not view the contents of the letter.
The above content is purely blind compilation, just to let everyone understand the terms wallet, private key, and public key more concisely.
The private key, public key, address, and digital signature in the above story, if straightforwardly explained:
Private key: Just like the password of a bank card, with the private key, you can use the digital assets at the corresponding address.
Public key: It is generated by the private key, but the private key cannot be obtained by public key inversion. The role of the public key is to cooperate with the signature to prove that “I am the owner of the private key.
Address: Just like a bank card number, you need to give the address (bank card) to others when you receive money, and let others transfer the digital assets to your address (bank card).
Digital signature: can only be generated by the private key, and the public key can prove that “the private key is with me!”
As for the various encryption algorithms mentioned in it, we will explain to you in detail later. If you want to know, you can Google it yourself!