πͺͺIdentity Layer
The Identity Layer in Kalp Network provides a secure and reliable framework for verifying and managing user identities. This layer integrates the power of KYC (know your customer) Oracles with the established trust of third-party KYC providers like Authbridge and Sumsub. By leveraging this combined approach, the Kalp Network ensures that all participants within the ecosystem are thoroughly verified, fostering a high level of security and regulatory compliance.
KYC Oracles with Trusted 3rd Party KYC Providers
KYC Oracles serve as a tool between the Kalp Network and external KYC providers, ensuring that participant verification is both rigorous and streamlined. The oracles automate the verification process, retrieving and validating KYC/KYB data against the providers' databases, thus minimizing fraud risk and enhancing trust within the network.
Public Key Whitelisting through KYC Verification
Upon successful KYC verification, the participant's public keys are whitelisted, a process that entails recording the public keys in a dedicated registry on Kalpβs system chain. This whitelisting mechanism ensures that only verified participants can engage in transactions within the Kalp ecosystem, thereby maintaining a secure and compliant environment. The System Chain's universal accessibility across the Kalp ecosystem facilitates the seamless verification of these whitelisted keys across all chains, ensuring integrity and trust in interactions network-wide.
Distributed Certificate Authority
The Distributed Certificate Authority within the Kalp Network plays a crucial role in identity management, generating Kalp Identity, and handling the registration of the generated ECDSA public key, specifically using the curve P-256. This mechanism is central to the secure and private management of cryptographic keys within the ecosystem.
The process of generating the key pair is designed to ensure the utmost security and privacy. Private keys are generated locally on the user's device, ensuring that they never leave the confines of the device, thereby mitigating the risk of exposure. The public key, derived from the private key, is then used to register the user within the Kalp network. This registration is a testament to the user's verified presence and readiness to interact within the ecosystem.
Unified Private Key Interaction
A distinguishing feature of the Kalp Network's identity layer is the use of a single private key to interact across all multi-chains within the ecosystem. This approach simplifies the user experience while maintaining high security and privacy standards, allowing for seamless interaction across the diverse landscape of the Kalp Network without compromising the user's control over their private keys.
Last updated