level
Beginner Level Reading
02 Jun, 2024

Deterministic Wallet

[ Dih-tur-muh-nis-tik wol-it ]

A deterministic wallet can generate and recover multiple crypto address keys from one seed phrase.

Yulia Zakharchuk
Written by
Julia Zakharchuk
Yulia Zakharchuk Julia Zakharchuk Expert Author
Julia is a professional crypto and blockchain writer known for her insightful YouTube channel "MoneyFest." She showcases her dynamic presentation skills as a host and moderator at blockchain conferences. Julia drives also business development at ChainUp and advises UNITBOX, an innovative NFT renting protocol. With her exceptional expertise, Julia is a highly valued industry contributor...
vladimir-niktin
Fact checked by
Vladimir Nikitin
vladimir-niktin Vladimir Nikitin Expert
Vladimir Nikitin is the CIO and Co-founder of Lifty.io, leveraging his extensive entrepreneurial experience. With over six years in the blockchain industry, he initially held the position of Head of Partnerships at ICObench, the world's leading ICO project rating platform. Subsequently, he took on the role of CEO at SpaceSwap, one of the pioneering Yield...

What Is a Deterministic Wallet?

blockquote icon

A deterministic wallet is a storage program that allows users to generate and access crypto addresses from a single seed.

The seed acts as a master password used to recover fund access from all chains and accounts without having to save individual pairs of recovery keys.

Instead, users have a private seed phrase (12 to 24 secret words) to regenerate all wallets using a master public key. Users can still use individual key pairs to access accounts. The seed phrase is just a more convenient alternative to back up cryptocurrency wallets.

Non-Deterministic Wallet vs Hierarchical Deterministic Wallet
Non-Deterministic Wallet vs Hierarchical Deterministic Wallet | Cryptosafetyfirst

Most current wallets use a modern variant called hierarchical deterministic wallet (HD). They are designed in the Bitcoin Improvement Proposals BIP-32 and BIP-44 (2012-2014). 

Earlier wallets were non-deterministic, meaning each pair of address keys was generated separately. Users had to store all of them to recover full access to funds.

Instead, HD and deterministic wallets derive all pairs from the seed phrase, automatically recovering address keys and balances from every chain and account:

The (HD) deterministic wallet structure
The (HD) deterministic wallet structure | Source: Medium.com
blockquote icon

The original Bitcoin Core wallet (~2009) was non-deterministic.

Bitcoin Armory Wallet (~2012) is a simple-deterministic example. Metamask (2016) is an HD wallet.

“As the name of deterministic wallet implies, the deterministic property means that all keys in a wallet are deterministically generated from a “seed” so that when necessary (e.g., the crash of the device hosting the wallet) the wallet owner can recover all the keys from the seed.”

– Hu, M. 

How Does a Hierarchical Deterministic Wallet Differentiate From a Deterministic Wallet?

Despite better backup systems, investors often use multiple accounts to reduce risk (whether it’s in case of corrupted addresses or cyber-attacks). 

Depending on whether the wallet is simple or hierarchical, the accounts will be linked to the same seed or independent ones, respectively.

Deterministic Wallet vs Hierarchical Deterministic Wallet
Deterministic Wallet vs Hierarchical Deterministic Wallet | Source: Medium.com

First, here’s a structure example of classic, non-deterministic wallets:

example of classic, non-deterministic wallet

A simple Deterministic Wallet would look like the following:

simple Deterministic Wallet example

HD wallets can access all accounts with one seed:

HD wallet

Final Thoughts 

Due to their convenience and flexibility, HD structures soon became the standard for modern wallets such as Ledger, Metamask, and Electrum. If users forget or lose a certain key pair, they can recover it from the seed phrase. If it’s not stored securely, however, this gives attackers the same convenience.

To prevent this, it’s recommended to implement two-factor authentication (2FA), multi-signature wallets, burner wallets for suspicious platforms, and other measures.

doc ico
Article Sources
arrow ico

Coinweb requires writers to use primary sources to support their work. These include white papers, government data, original reporting, and interviews with industry experts. We also reference original research from other reputable publishers. You can learn more about the standards we follow in producing accurate, unbiased content in our editorial process.

Yulia Zakharchuk
Written by

Julia is a professional crypto and blockchain writer known for her insightful YouTube channel “MoneyFest.” She showcases her dynamic presentation skills as a host and moderator at blockchain conferences.

Julia drives also business development at ChainUp and advises UNITBOX, an innovative NFT renting protocol. With her exceptional expertise, Julia is a highly valued industry contributor and is set to make a lasting impact.

More crypto lingo