Skip to content

Paper Keys

Last Updated
7/12/2021
Category
Sharing & Permissions
Propose a change

The Design Problem

When wanting to grant access to a resource in a decentralized system, we can’t necessarily depend on a trusted entity. Instead, we use a randomly generated list of numbers and letters, commonly called “keys,” that grant access to resources. A resource could be an account, a group invitation, or a piece of data.

These passwords can be very large, sometimes hundreds of characters. Because of this, it can be difficult to save or share these keys in the physical world.

The Design Solution

The user can save or print a file that can be used to gain access to the resource. The file itself should be easily human readable and printable.

You can use this in conjunction with the QR Code verification pattern to make it easier to import the codes with the device’s camera.

Examples

Why Choose Paper Keys?

Paper Keys is a safe and accessible method to verify, share, or backup information.

Best Practice: How to Implement Paper Keys

It is advisable that users know the risks, and have a secure and oragnised place to store the keys. Be clear with users that they should print it or save it in a safe backup location in case their device gets lost or stolen.

Potential Problems with Paper Keys

If lost, access to data is potentially lost permanently.

If found by an adversary, it can lead to unauthorized access to data.

References & Where to Learn More

Projects by IF has outlined a similar design pattern called Recovery Codes.

Investigating the Usability Issues Non-Crypto Savvy Users Encounter When Setting Up Desktop Wallets