Cube
Trade
Pro
Advanced trading interface with professional tools
Swap
Exchange cryptocurrencies instantly
Bundles
Trade multiple tokens in a single transaction
Algos
Create and manage automated trading strategies
Portfolio
Portfolio
View your cryptocurrency holdings and performance
Orders
Track your open and completed orders
Transactions
View your complete transaction history
Rewards
Rewards Dashboard
View your rewards and claim loot boxes
Blocks Leaderboard
See top traders competing for block rewards
Referral Leaderboard
See top referrers and track referral rankings
Investors
Investor Resources
Browse investor resources and documentation
Presentation (pdf)
Download investor presentation
Settings
Profile
Your profile and account verification
Subaccounts
Separate portfolios across subaccounts
Address Book
Manage saved withdrawal addresses
Multi-Factor Authentication
Add a verification step for sensitive account actions
API Keys
Connect applications to your account
Onramp
Link bank account to buy crypto
Account Recovery
Manage account recovery setup
Learn
News
Read the latest news, announcements, and updates from Cube Exchange
What-Is Guides
Learn about cryptocurrencies
FAQ
Frequently asked questions about Cube Exchange
Fees
View our transparent fee schedule and pricing information
Security
Learn more about Cube Exchange security
About
About
Learn more about Cube Exchange
Legal
Legal information, terms of service, privacy policy, and risk disclosures
EN
Select Language
EN
English
ES
Español
ID
Bahasa Indonesia
JA
日本語
PL
Polski
PT
Português
RU
Россия
TH
แบบไทย
TR
Türkçe
UK
Україна
VI
Tiếng Việt
ZH-CN
简体中文
ZH-TW
繁體中文
Light
Dark
System
Sign In
/
Foundations
/
Cryptography
/
Threshold Systems
/
Foundations: Cryptography / Threshold Systems
What is a Threshold Signature Scheme (TSS)?
Threshold signature schemes let a group control one signing key without ever putting the full private key in one place. That sounds like a small change, but it reshapes the security model: compromise now requires multiple shares, while the outside world still sees an ordinary signature.
Mar 21, 2026
•
26 min read
#THRESHOLD SYSTEMS
What is Distributed Key Generation (DKG)?
Distributed Key Generation, or DKG, solves a subtle trust problem: how do several parties end up with shares of one private key if no one should ever create that key alone? The answer is a protocol that turns secret sharing from a dealer-based ceremony into a joint computation, which is why DKG sits underneath threshold signatures, randomness beacons, and many modern custody systems.
Mar 21, 2026
•
24 min read
#THRESHOLD SYSTEMS
What is Key Resharing?
Key resharing solves a subtle problem in threshold cryptography: how do you change who holds a key without changing the key itself? By redistributing fresh shares of the same secret, systems can rotate operators, recover from compromise, and keep long-lived threshold keys usable without ever reconstructing the private key in one place.
Mar 21, 2026
•
23 min read
#THRESHOLD SYSTEMS
What is Multi-Party Computation (MPC)?
Multi-party computation lets several parties compute a result together without handing each other their raw secrets. It matters because it changes the usual tradeoff between coordination and privacy: you can collaborate on sensitive data, or control a cryptographic key, without any one place becoming the point of total trust or total failure.
Mar 21, 2026
•
26 min read
#THRESHOLD SYSTEMS