📖
Web3 Encyclopedia
  • Welcome aboard!
  • Source
  • 😀Evolution from Web 1.0 to Web 3.0
    • Web 1.0 Web 2.0 Web 3.0
    • Key Features
    • Current Limitations
    • Future of Web 3.0
    • Learn: What Is Web3?
    • Learn: Will Every Brand Have a Web3 Strategy?
    • Learn: Big Ideas in 2023
    • Learn: The Web3 Paradox: Why Scaling Usage Alone Won't Lead to Mass Adoption?
    • Learn: Is Web3 A Marketing Buzz or Tech Revolution?
    • Learn: What is the relationship between blockchain and Web3?
    • Learn:Empowering Women in Web 3.0: The Role and Contributions of Women in Blockchain, DeFi, and dApp
    • Learn: Web 3.0 and the Future of E-Commerce
    • Learn: 12 ways ecosystem projects can attract more developers
    • Learn: How Web3 is Impacting Education?
    • Learn: Web3 And The Future Of Digital Advertising
    • Learn: Web3’s impact on personalization, trust and engagement
    • Learn: Web3-Powered Identity Management -- Unlocking the Benefits of Decentralization
    • Learn: Why Web2 companies fail in Web3 while others made it?
    • Learn: To Identify or Not in a Web3 World?
    • 🤫[Insider Series] McKinsey x Web3
    • TL;DR 👀
  • 💲Blockchain Fundamentals
    • Why is Blockchain So Popular?
    • Introduction to Blockchain
    • Blockchain Misconceptions
    • Blockchain vs Bitcoin, Database, Cloud
    • Consensus Mechanism
    • Public and Private Keys
    • Hash Functions and Cryptography
    • Sharding
    • Types of Blockchains: PoW, PoS and Private
    • Understanding Cryptocurrency
    • Coins vs Tokens
    • Blockchain Trilemma
    • Legality
    • Learn : Google’s Cloud Based Blockchain Node Service
    • Learn: How Blockchain, Digital assets, and Web3 Unlock Financial Inclusion Globally
    • Learn: Will Chinese-Made Crypto Soar Higher?
    • Learn: What Does MiCA Mean for Crypto in Europe?
    • Learn: Unraveling the Intricacies of Blockchain Forensics and Asset Tracking
    • Learn: Promising blockchain use cases in healthcare industry
    • Learn: The Role of Blockchain in Authenticating and Provenance Art
    • Learn: Blockchain-Based Digital Identity: Benefits, Risks, and Implementation Challenges
    • Learn: The Future of Energy Supply Chains
    • Learn: Revolutionizing smart contracts and cryptocurrency
    • Learn: Nigeria goes blockchain
    • Learn: A Game Changer for Online Gaming?
    • Learn: Is blockchain technology ready for high-storage applications?
    • Learn: Will Blockchain Technology Mark a Turning Point in Fraud Prevention?
    • Learn: Why ZK-rollups need data availability?
    • Learn: How will generative AI disrupt blockchain?
    • Learn: A New Blockchain for Generative AI?
    • TL;DR 👀
  • 🏟️Web3 Utilities
    • Decentralized Applications (dApps)
    • Cross-chain Bridges
    • DAO
    • Artificial Intelligence
    • Learn: Is Community-building Essential for Web3 Startups?
    • Learn: ‘Decentralization Theater’
    • Learn: Crypto and AI- A yay or nay combination?
    • Learn: Dissecting the DAO
    • Learn: What is motivating Lido DAO to rise?
    • Learn: How to Turn Your Community Into a DAO?
    • Learn: The Key to Decentralized Decision Making
    • Learn: How Web 3.0 can disrupt the supply chain industry?
    • TL;DR 👀
  • 🪙Bitcoin
    • What is Bitcoin
    • Bitcoin's Blockchain Technology
    • UTXO Model and Transaction Fees
    • Bitcoin Mining and Mempool
    • Learn: What is bitcoin mining?
    • What are Hard Forks and Soft Forks
    • What is SegWit and the Lightning Network
    • Bitcoin Ecosystem
    • Can Bitcoin be Destroyed? Game Theory and Network Attacks
    • Learn: Crypto token supplies explained
    • Learn: What is crypto tax-loss harvesting, and how does it work?
    • Learn: Can Crypto Go Green? How to Invest in Eco-Friendly Cryptocurrencies
    • Learn: Why Did FTX Collapse? Here’s What to Know.
    • Learn: How Sam Bankman-Fried swindled $8 billion in customer money?
    • Learn: How much is Bitcoin worth today?
    • Learn: The Costs of Running a Bitcoin Node In Nigeria
    • Learn: Has 2022 Left Any Crypto Positives?
    • Learn: How Crypto Exchanges Can Be Free of Risk?
    • Learn: Greed, Lies and FTX: Is Crypto a Force for Good or Evil?
    • Learn: Is Crypto a Cultural Movement?
    • Learn: What are the consequences of crypto’s ongoing regulatory process?
    • Learn: Beyond the Crash and Embracing NFTs?
    • Learn: Understanding crypto bag holders and their mindset
    • Learn: Inscriptions: Just A Fad, Or A Real Threat To Bitcoin Becoming Decentralized Money?
    • Learn: How Bitcoin Ordinals Can Change the Future Of Mining?
    • Learn: What is a supernet?
    • Learn: Bitcoin Miners Celebrate 10 Years Since First ASIC, What Changed Since Then?
    • Learn: Bill Vs. CBDC – Why This US Congressman Wants To Block The Fed From Issuing A Digital Dollar?
    • Learn: Why Bitcoin Will Blow People’s Minds In 2025?
    • Learn: How the Howey Test Sheds Light on Cryptocurrency's Regulatory Gray Area
    • Learn: Cryptocurrency vs AI: A Complex Debate
    • Learn: Where the U.S. Government Went Wrong in Regulating Crypto?
    • Learn: The Nostr Privacy Paradox
    • Learn: Do algorithmic stablecoins have a future as centralized coins are under scrutiny?
    • Learn: Is Bitcoin Set To Revolutionize The Financial World With Its Superior Purchasing Power?
    • Learn: What is Shibarium, and what does it mean for Shiba Inu?
    • Learn: What is a crypto dusting attack?
    • Learn: Is the Adoption of Central Bank Digital Currencies (CBDCs) the Future?
    • Learn: How Artificial Intelligence Could Revolutionize Crypto?
    • Learn: What’s next for EU’s crypto industry as European Parliament passes MiCA?
    • Learn: Why the EU Has MiCA and the U.S. Has Securities Law Confusion?
    • Learn: Six New Projects Looking to Mitigate Bitcoin Mining’s Energy Footprint
    • Learn: Who on Crypto Twitter chose not to pay for a blue checkmark?
    • Learn: What is the wash-sale rule in Crypto?
    • Learn: What is Pepecoin and can it flip memecoins Dogecoin and Shiba Inu?
    • Learn: Can you recover stolen Bitcoin from crypto scams?
    • Learn: What the ‘anti-mining bill’ means for the crypto industry in Texas?
    • Learn: Does the US have a crypto ‘tax loophole’ problem?
    • Learn: How users can stay protected?
    • Learn: How Crypto Revolutionize Cheaper and Faster Transactions?
    • Learn: Can NFTs and CFDs be BFFs?
    • Learn: A PR expert’s tips for memecoin projects
    • Learn: Why politicians aren't convinced about the Digital Euro?
    • Learn: How A 90-Year Old TA Theory Predicted The Sudden Bitcoin Boom?
    • Learn: Social Trading Platforms and CFDs: A New Paradigm in Investment
    • Learn: How could the Chinese economic crisis impact Bitcoin and crypto?
    • Learn: How do they compare: Bitcoin IRA vs. traditional IRA?
    • Learn: Why Tokenized Assets Are Safer During a Banking Crisis?
    • TL;DR 👀
  • 🛢️Ethereum
    • Bitcoin vs Ethereum
    • What can Ethereum do?
    • What is Ether (ETH)?
    • What's Unique About ETH?
    • What are Smart Contracts?
    • Energy Consumption?
    • Ethereum Virtual Machine (EVM)
    • Pros & Cons of Smart Contracts
    • Decentralized Applications (dApps)
    • Ethereum Token Standards (ERC-20, ERC-721 and ERC-1155)
    • Evolution of Ethereum
    • How to Get Your First Ethereum
    • Learn: Next Ethereum Upgrade — Shanghai Upgrade
    • Learn: Tipping Scale for Crypto Adoption: Usability vs. Accessibility
    • Learn: Major Publicly Traded U.S. Bitcoin Miner Files For Chapter 11 – Impact On The Market?
    • Learn: 5 altcoin projects that made a real difference in 2022
    • Learn: How Tether Can Be a More Stable Stablecoin?
    • Learn: Are the Ethereum Killers Still Deadly?
    • Learn: What Ethereum Tech Trends Are Weathering the Bear Market?
    • Learn: How Ethereum’s token burns are making it a deflationary cryptocurrency?
    • Learn: A few things to know about Ethereum's Shanghai Upgrade
    • Learn: The Role of Enterprise Ethereum
    • Learn: Understanding Layer 2 Scaling Solutions for the Ethereum Network
    • Learn: The Battle of Giants: Bitcoin vs Ethereum
    • Learn: Cryptography, Smart Contracts and Distributed Networks
    • Learn: The Memecoin Grift and How It Threatens Ethereum Culture
    • Learn: What Is Ethereum’s ‘Data Availability' Problem, and Why Does It Matter?
    • TL;DR 👀
  • 👛Wallet
    • What is a Blockchain Wallet?
    • Hardware / Software Wallet
    • How to Get Your First Cryptocurrency
    • Setting up Metamask Wallet
    • Learn: How to connect the Avalanche network to MetaMask?
    • Learn: How to pass on your crypto when you die?
    • Learn: What are hierarchical deterministic (HD) crypto wallets?
    • Learn: Pros and Cons of Digital Wallets
    • Learn : How Web 3.0 Wallets Are Redefining Digital Asset Security?
    • Learn: Open source: Buzzword or real security for crypto wallets?
    • TL;DR 👀
  • 🌕New & Rising Protocols
    • Binance
    • NEAR
    • Solana
    • Fantom
    • Polygon
    • Cardano
    • Polkadot
    • Cosmos
    • Harmony
    • Cronos
    • Optimism
    • Terra
    • Who Will Win the L1 Wars?
    • Learn: New Layer 1 Blockchains Are Expanding the DeFi Ecosystem But No Eth Killers Yet
    • Learn: Is an Increased Focus on Layer-2 Scaling and ZK Technology Justified?
    • Learn: What Are the Stakes in the SEC vs. Ripple Case?
    • Learn: What is The Graph, and how does it work?
    • TL;DR 👀
  • 📈Decentralized Finance (DeFi)
    • CEX vs DEX
    • CeFi vs DeFi
    • Algorithmic Stablecoins
    • Airdrop
    • Liquidity Pool
    • Impermanent Loss
    • Swapping
    • Wrapped Token
    • Arbitrage Opportunities
    • Staking
    • Yield Farming
    • Total Value Locked (TVL)
    • Gas Fees
    • Lending & Borrowing
    • Useful Tools
    • Activity: Uniswap & Pancake Swap
    • Learn: Automated Market Makers (AMMs) in DeFi
    • Learn: Crypto Moving towards ESG: What Is Regenerative Finance (ReFi)
    • Learn: What Is dYdX? Understanding the Decentralized Crypto Exchange
    • Learn: It's A Wrap - DeFi in 2022
    • Learn: Why DeFi should expect more hacks this year?
    • Learn: The Security Challenges of DeFi
    • Learn: The Promising Future of Decentralized Social Media on Web 3.0
    • Learn: Can CBDCs, Tokenized Deposits, Stablecoins and DeFi Coexist?
    • Learn: The Increasing Popularity of DeFi and Its Potential to Disrupt Traditional Finance
    • Learn: The future of DeFi is ReFi
    • Learn: DeFi aggregation
    • TL;DR 👀
  • 🙈Non-Fungible Token (NFT)
    • What are NFTs?
    • Case Study
    • Storage
    • Who are the Players?
    • NFT Marketplace
    • NFT Useful Resources
    • Activity: Mint Your Own NFT
    • Learn: How You Can Prevent Hackers From Stealing Your NFTs?
    • Learn: What Is an NFT Floor Price?
    • Learn: Should Bored Ape buyers be legally entitled to refunds?
    • Learn: China’s view of NFTs different from rest of the world’s
    • Learn: NFTs IRL: How Digital Collectibles Are Forging Offline Experiences
    • Learn: How NFT Brands Can Cut Through The Noise
    • Learn: How Web3 disrupts the music sector?
    • Learn: Unlockable content in NFTs
    • Learn: Why Meta Matters in NFTs?
    • Learn: Should NFT Marketplaces Become Centralized?
    • Learn: Hermès vs. MetaBirkins: The NFT Case That Could Have Major Trademark and Artistic Consequence
    • Learn: What are phygital NFTs, and how do they work?
    • Learn: What is NFT ticketing and how does it work?
    • Learn: Why Solana NFT marketplace is seeing less active users?
    • Learn: NFTs and Intellectual Property
    • Learn: How AI Is Changing Artistic Creation and Challenging IP Laws?
    • Learn: The Future of NFTs: Exploring Dynamic NFTs and Their Versatile Use Cases
    • Learn: NFTs in the event and ticketing industry
    • Learn: What is NFT rarity, and how to calculate it?
    • Learn: What happens to your NFTs when you die?
    • Learn: Dogecoin-Like Spike in Milady NFTs After Elon Musk’s Tweet, But Will It Last?
    • Learn: What are NFT royalties, and how do they work?
    • Learn: How developers aim to store crypto inside NFTs?
    • Learn: Generative Art NFTs: What Are They & Why Are They So Popular?
    • TL;DR 👀
  • 💗Metaverse
    • What is the Metaverse?
    • Metaverse Economy
    • Metaverse Companies
    • GameFi
    • Learn: Are We in the Metaverse Yet?
    • Learn: Can the Metaverse exist without blockchain?
    • Learn: Can the Metaverse Facilitate Sustainable Growth of Defi Systems?
    • Learn: What is the role of biometrics in the metaverse?
    • Learn: Can metaverse be the future court?
    • Learn: Metaverse Fashion Is on the Rise, but for Whom?
    • Learn: Sustainability in the Metaverse: Challenges and Opportunities
    • Learn: How To Build A Responsible Metaverse?
    • Learn: What is a VTuber, and how do you become one?
    • Learn: How proof-of-identity provides human experiences?
    • Learn: The “Metaverse” Next Frontier for Business: Impact And Challenges
    • Learn: The 5 Biggest Misconceptions About The Metaverse
    • Learn: Why culture and ownership are critical to the metaverse?
    • TL;DR 👀
  • 👾Career in Web3 (coming soon)
    • Developers
    • Moderators
    • Community Managers
    • UI/ UX Designers
    • Digital Fashion Designers
  • 🌱Sustainability (Coming Soon)
    • Industry Effort
    • Co-author
Powered by GitBook
On this page
  • What are deterministic and non-deterministic wallets?
  • How does a hierarchical deterministic wallet work?
  • What are the benefits and drawbacks of using an HD wallet?
  • Are HD wallets safe?
  1. Wallet

Learn: What are hierarchical deterministic (HD) crypto wallets?

PreviousLearn: How to pass on your crypto when you die?NextLearn: Pros and Cons of Digital Wallets

Last updated 2 years ago

What are deterministic and non-deterministic wallets?

A hierarchical deterministic wallet generates public and private keys from a master key, allowing users to create a new wallet and retrieve all addresses and keys, given that they have access to the seed. On the contrary, non-deterministic wallets randomly generate wallet addresses and private keys, restricting users’ ability to recover addresses and keys if the wallet’s details are lost.

Typically, digital signatures and pairs of are used in . That said, users spend their money by signing a transaction with the private key, and other users (recipients) can use the public key to confirm the signature’s validity. Private keys can be used to generate public keys, but not the other way around.

For instance, a user’s comprises a set of private keys that enable the owner to spend any Bitcoin () linked to those keys. When the user needed them, Bitcoin wallets would randomly generate BTC addresses and private keys. Such types of digital wallets are called non-deterministic wallets (ND).

However, since the keys are not generated in any pattern, users must make a backup of each key whenever a new one is generated. That said, if , all of the addresses and keys would also be lost.

This type of Bitcoin wallet is also known as a “just-a-bunch-of-keys” (JBOK) wallet, as it produces unrelated keys and requires users to keep track of their transactions every time they buy and sell their cryptocurrencies. So, what are hierarchical deterministic (HD) wallets?

Hierarchical deterministic wallets took the place of JBOK wallets since users could back up HD wallets using and greatly benefit from extended keys. Therefore, a wallet that generates its public and private keys from a seed is referred to as a hierarchical deterministic wallet.

These wallets can be used for a variety of intriguing things, such as trustless auditing, online shopping and departmental funding distribution by the treasurer. For instance, an individual might disclose their master public key to external auditors, who could then use that key to view any future transactions made using BTC. In this case, the user’s funds are secure because the private keys linked to those funds are never revealed.

The summary of differences HD vs. non-HD wallets is listed in the table below:

How does a hierarchical deterministic wallet work?

To increase security and privacy, an HD wallet creates a fresh key pair from a master key pair (consisting of an extended private key and an extended public key) for each cryptocurrency transaction.

A master key pair consisting of an extended private key (XPRIV) and an extended public key (XPUB) is typically present in HD wallets for Bitcoin. Additionally, a child private key is created pseudorandomly from a master private key, and the matching child public keys can be generated by anybody who knows the master public key.

The XPRIV produces all of the child private keys, and the XPUB may display the balances of all the child public keys in the wallet. Moreover, the need for storing multiple key pairs is eliminated, as HD wallet addresses can be generated from the master key or seed.

A web retailer that creates new public keys for each sale is an inspiring use case for HD crypto wallets. Using a deterministic wallet, the merchant can quickly produce and save only the public keys on a risky internet server while keeping all of the related private keys secure in offline storage. Additionally, the retailer can use HD wallets’ hierarchical feature to keep only the public keys required to process consumer payments, which might improve the privacy of the user.

What are the benefits and drawbacks of using an HD wallet?

With hierarchical deterministic wallets, users’ privacy is improved because they can share their master public key with others without putting their money in jeopardy. Similarly, HD wallets are secure since funds are diversified over numerous addresses. However, there is a substantial chance of money being lost if the master key or private keys get revealed to the public.

Due to the hierarchical structure of deterministic wallets, every private key generated by the seed has the potential to be utilized as a master private key, which can then be used as a deterministic wallet to generate further keys.

Also, the changing addresses offer enhanced privacy, as one cannot find out the exact wallet balance from the public ledger. However, anyone who has access to the extended private keys can steal users’ funds, which is why they shouldn’t be shared with non-trusted parties.

Along with improved privacy, deterministic wallets offer great security, as access to a number of different private keys will be required to gain access to all of the users’ crypto assets because they have spread their funds across several addresses. Furthermore, the coins that are controlled by other private keys remain unaffected if one private key is compromised. However, if the seed is compromised, all funds may be stolen by hackers.

Are HD wallets safe?

HD wallets are as secure as the medium (physical or digital) on which they are stored.

BIP-32 enables an HD wallet to produce a tree-like hierarchical structure of private keys from the seed. As a result, if a device is lost or destroyed, the seed backup can be used to restore the wallet along with all of the tree’s private keys.

Hierarchical deterministic wallets offer enhanced security and privacy compared to non-deterministic wallets. They are secure because a new address is issued for every new transaction. Therefore, hacking them is a challenging and intricate process. Additionally, an indefinite number of public addresses can be created for the purpose of collecting payments, ensuring users’ financial anonymity.

However, if either private keys or master keys are not safely stored, they can expose users’ funds to malicious actors. Therefore, the chosen seed phrases in HD wallets should be unrelated to users’ names or any other personal details that attackers will find simpler to compromise.

With BIP-32, HD wallets become the de facto standard for Bitcoin. BIP-32 is the that introduced the development of a wallet structure that resembled a hierarchical tree.

In an HD wallet like , a single master key is derived from the wallet seed, which is then used to generate child keys, each of which is capable of generating its own children. A seed, often represented as a mnemonic phrase, is a piece of information that can be used to produce both the wallet’s public and private keys.

The same tree of keys will be generated by the master key, allowing users to back up a single seed rather than hundreds of keys in the case of non-deterministic wallets. Furthermore, XPUB keys allow users to receive Bitcoin directly into a and keep their private keys offline because they allow users to generate new addresses using online extended public keys.

This article first appeared in Cointelegraph, by

👛
Bitcoin Improvement Proposal (BIP)
MetaMask
cold storage wallet
Onkar Singh
private and public signing keys
blockchain-based cryptocurrencies
Bitcoin wallet
BTC
the wallet’s details are lost
a single seed