How Pikcio’s Peer to Peer protocol enables privacy and secure interactions

PikcioChain
Jan 16 · 3 min read

How it works

A) Untraceable and anonymous interactions

  1. The Matryoshka protocol will generate a 256-bit AES random key in order to encrypt the content of the exchange.
  2. In turn, recipient R’s RSA2048 public key encrypts this AES key.
  3. Sender V adds a signature with its own private key so its identity can be verified by the recipient.

PikcioChain

PikcioChain: The secure blockchain-based exchange for personal data.

PikcioChain

Written by

The personal data chain

PikcioChain

PikcioChain: The secure blockchain-based exchange for personal data.