📄️ 3.1.1. Storage of Cryptoassets: Fundamental Principles
Core principles of cryptoasset storage, ownership models, and the cryptographic foundations of key management
📄️ 3.1.2. Custodial Storage of Cryptoassets
A model of cryptoasset storage involving the transfer of private key control to a third party: advantages and associated risks
📄️ 3.1.3. Non-Custodial Storage of Cryptoassets
A model of cryptoasset storage in which the user independently controls private keys: examples, advantages, and associated risks
📄️ 3.1.4. Hardware Wallets
Architecture, cryptographic principles, device examples, and a comparative analysis of hardware and software wallets
📄️ 3.1.5. Hardware Security Modules (HSM)
Architecture, operating principles, and the use of hardware security modules in cryptographic key management
📄️ 3.1.6. MPC (Multi-Party Computation)
Architecture of distributed private key management, operating principles of MPC, and a comparative analysis with multisignature schemes
📄️ 3.1.7. Multisignature (Multisig)
Architecture of multisignature wallets, operating principles, comparison with MPC, and integration with hardware-based security mechanisms