Threshold SystemsMar 21, 2026What is a Threshold Signature Scheme (TSS)?Learn what a Threshold Signature Scheme (TSS) is, how threshold signing works, why it exists, and the security tradeoffs behind MPC-style key sharing.26 min read
Threshold SystemsMar 21, 2026What is Distributed Key Generation (DKG)?Learn what Distributed Key Generation (DKG) is, how dealerless key setup works, why it matters for threshold signatures, and where it can fail.24 min read
Threshold SystemsMar 21, 2026What is Key Resharing?Learn what key resharing is in threshold cryptography, how it preserves a public key while rotating shares, and why it matters for MPC and threshold signing.23 min read
Threshold SystemsMar 21, 2026What is Multi-Party Computation (MPC)?Learn what multi-party computation (MPC) is, how it protects private inputs during joint computation, and why it powers threshold signing and MPC wallets.26 min read