Phygital Authentication
This use case describes a method to link one or more secondary wallets (signing wallets) to a main wallet using PAL primitives. This setup allows these secondary wallets to prove they control the main wallet without exposing its key details. The signing wallets use cryptographic signatures to show they can access or influence the main wallet, ensuring that ownership and control are verifiable and secure.
Enhancements with Layer 2
The proposal acknowledges the evolution of Layer 2 solutions and ENS functionalities on these layers. It highlights that with these advancements, off-chain verification of linked addresses becomes feasible, even when domains are managed across different chains. This broadens the applicability and flexibility of the system in a multi-chain environment.
Last updated