• Explore
        How It WorksEcosystem ShowcaseRoadmapCommunity ConversationsIC Dashboard
  • Learn
        Developer CenterDocs IntroductionInternet Computer ReviewDev Forum
  • Ecosystem
        ICADeveloper GrantsFellowshipBeacon FundNewsletter
  • Foundation
        DFINITY FoundationTeamCareersEventsMedia
DFINITYHow it WorksChain Key Cryptography

Chain Key Cryptography

Chain Key cryptography is one of the fundamental breakthroughs enabling the Internet Computer to scale to millions of nodes. The most notable innovation of Chain Key cryptography is that the Internet Computer has a single public key, which enables any device to verify the authenticity of artifacts generated by the Internet Computer, even smart watches and mobile phones.

  • Chain Key Cryptography: The Scientific Breakthrough Behind the Internet Computer
  • Integrating The Internet Computer and Bitcoin Networks

More academy sessions

Internet Computer Blockchain Overview

Learn more

Motoko Smart Contract Language

Learn more

Network Nervous System: Internet Computer Blockchain Governance

Learn more

Noninteractive Distributed Key Generation

Learn more

Internet Identity: Anonymizing Blockchain Authentication System

Learn more

Internet Computer Consensus

Learn more

Peer-to-Peer Layer

Learn more

Resumption

Learn more

Blockchain Protocol Upgrade

Learn more

Message Routing

Learn more

Canister smart contract lifecycle

Learn more

Certified Variables

Learn more

Direct Integration with Bitcoin

Learn more

Threshold ECDSA Signing

Learn more
Developers
Developer CenterShowcaseTechnical LibraryConversations
Team
FoundationEventsCareersFellowship
Ecosystem
RoadmapGrant ProgramBeacon FundData CentersSecurity Bug Report
Media
Featured VideosFeatured StoriesNewsletter
Social
GitHubMediumTwitterYouTube
Dev ForumDev DiscordTelegramLinkedIn
RedditFacebookThe Reboot

© 2021

site_logo
Terms of UseCookie PolicyPrivacy Policy