Ruby One V2
  • Ruby One V2 - Your Complete Ruby One Wallet Guide
  • General Introduction
    • Vision of Ruby One
    • What is Ruby One V2?
    • What is MPC technology?
    • Is MPC technology secure?
    • What are the benefits of MPC technology?
  • Why Use Ruby One
    • High-Security Wallet Access Through MPC
    • Contract Accounts for Secure and User-Friendly Blockchain Interaction
    • Third-Party DApp Integration with the Ruby DApp Bridge
    • Bridging the Web2-Web3 Gap
  • Tech Introduction
    • MPC-Secret Sharing
    • MPC-Threshold Signature Scheme
    • Social Recovery - DKIM
    • Contract Account Dynamic Upgrade
    • DApp Bridge
    • Ruby One V2 Upgrade Log
  • How to Use Ruby One V2
    • Launch App
    • Sign Up
    • Login Via Google
    • Login Via Email
    • Set Local Password
    • Backup Key Fragments
    • Three Test Networks
    • Send & Receive Crypto
    • Social Recovery Your Account
    • Sign Out & Clear Data
  • Term of Use
    • Welcome to Ruby Protocol
    • About the Website
    • Intellectual Property
    • Acceptable Use of the Website
    • Wallet Address, Private Key, and Backup Capabilities
    • Accuracy of Information Provided by User
    • Your Use of Ruby’s Services
    • Privacy Policies
    • Disclosure of Information
    • Changes and Availability
    • Contacting us via the Website
    • Age Restriction and Eligibility
    • Disclaimer of Warranty
    • Limitation of Liability
    • Changes to the Terms
    • Contact Us
  • Ruby One - MPC Wallet
Powered by GitBook
On this page
  1. General Introduction

What are the benefits of MPC technology?

Compared with other solutions, signing transactions with MPC is much more convenient and attuned to everyday users.

  • Blockchain-agnostic: MPC operates in the mathematical layer and, therefore, can be seamlessly applied to multiple blockchains and serve as the underlying technology for a true multi-chain wallet.

  • Single Point of Failure Elimination: This is the key to MPC-level security. Your private key within an MPC-backed solution is never created or held in one place.

  • Usability: Today, MPC is no longer a data science niche. Customers are using it to detect financial fraud, aggregate model features across private datasets, and much more.

  • Track Record & History: Secure computation has a long history. Since the 1980s, MPC has been a fertile area to investigate basic and general questions regarding utilizing multi-party computation for practical applications.

PreviousIs MPC technology secure?NextHigh-Security Wallet Access Through MPC

Last updated 1 year ago