Introduction to 2-of-2 Multisignature
What is 2-of-2 Multisignature?
SSP Wallet implements a true 2-of-2 multisignature system where both private keys are required to authorize any transaction. This is fundamentally different from traditional wallets that rely on a single point of failure.
How It Works
Traditional Single-Signature Wallets
[Private Key] β [Transaction] β [Broadcast]
β
Single Point of Failure
SSP's 2-of-2 Multisignature System
[SSP Wallet Key] + [SSP Key Mobile] β [Valid Transaction]
β β
Required Required
Key Benefits
π‘οΈ Enhanced Security
No Single Point of Failure: Compromising one device doesn't compromise your funds
True Two-Factor Authentication: Physical possession of both devices required
Self-Custody: You maintain full control of your private keys
π User-Friendly
Simplified Process: Complex cryptography handled seamlessly
Intuitive Interface: Easy-to-use for both beginners and experts
Cross-Platform: Browser extension + mobile app
π Cryptographically Sound
BIP48 Standard: Industry-standard hierarchical deterministic key derivation
Schnorr Signatures: Advanced cryptographic signatures for efficiency
Account Abstraction: ERC-4337 support for smart contract wallets
Real-World Analogy
Think of SSP Wallet like a safety deposit box that requires two keys:
You hold one key (SSP Wallet)
You hold the second key (SSP Key on your phone)
The bank (SSP Relay) facilitates the process but never has access to your keys
Technical Foundation
Address Generation
Each wallet address is generated using both public keys:
Address = multisig(PubKey_Wallet + PubKey_Mobile)
Transaction Signing Process
SSP Wallet creates and signs transaction with Key #1
SSP Key receives and signs transaction with Key #2
Complete Transaction is broadcast to the network
Comparison with Other Solutions
Security
β 2-of-2 MultiSig
β Hardware Secured
β Single Key
β Third Party Control
Convenience
β Easy to Use
β οΈ Hardware Required
β Software Only
β Very Easy
Self-Custody
β Full Control
β Full Control
β Full Control
β No Control
Recovery
β Dual Backup
β οΈ Hardware Risk
β Single Risk
β οΈ Platform Risk
Cost
β Free
β Hardware Cost
β Free
β Free
Why 2-of-2 Instead of 2-of-3 or Other Schemes?
2-of-2 Advantages:
Simplicity: Only two devices to manage
True Security: Both keys always required
No Confusion: Clear ownership model
Performance: Faster transaction processing
Other Schemes Drawbacks:
2-of-3: Introduces complexity and potential security holes
3-of-5: Overwhelming for average users
1-of-2: Defeats the purpose of multisig security
Getting Started
Ready to experience the security of true 2-of-2 multisignature?
Next Steps
Last updated