The wait is over. $LOCK is live!
LogoLogo
Back to Gridlock
  • 👋Welcome
  • ⚔️Guardians
    • ⚔️All About Guardians
      • Why can't a Guardian steal my crypto?
      • Can a hacker combine the devices in my network?
      • Why does Gridlock have 2 parts of my key?
      • Why not use a seed phrase for recovery?
      • Partner Guardians
  • 💎Gridlock Crypto Wallet
    • Getting Started
    • Guardians
      • How they work
      • Social Recovery
        • Device Migration
        • Guardian Replacement
        • Password Reset
    • Transactions
      • Purchasing
      • Sending and Receiving
    • NFTs
      • Gridlock Foundation Coin
        • How to claim the Gridlock Foundation Coin
    • Gridlock vs Cold Storage
  • 👑Gridlock Pro
    • Going Beyond Secure
    • Features
      • Advanced Monitoring
      • More Guardians
      • Access to Partner Guardians
      • Priority Support
  • 💫The tech
    • Design Principles
      • Simple
      • Safe
      • Non-custodial
    • Multi-Party Computation
    • Distributed Key Generation
    • Threshold Signatures
  • LOCK
    • Learn about LOCK
    • Earn some LOCK
    • General LOCK FAQ
  • 🧞‍♂️FAQs
    • General FAQs
    • Transaction FAQs
  • 🖥️Developer Docs
    • SDK / CLI Documentation
    • Gridlock Demo Setup
Powered by GitBook
On this page

Was this helpful?

  1. The tech

Distributed Key Generation

Splitting and distributing and encryption key make hacking nearly impossible because an attacker would have to gain accross to multiple devices in multiple locations.

Our process of key splitting improves upon traditional methods like Verifiable Secret Sharing (VSS) or Shamir Secret Sharing, leading to enhanced security and privacy through our novel Distributed Key Generation.

Existing key splitting techniques have are risky when the key is generated in a single location prior to splitting and sending it to recipients. If the original device is compromised, there's a risk of the key being accessed.

To circumvent this, we've devised Distributed Key Generation. This multi-party computation protocol ensures that the key is virtually generated across all devices, meaning your all-important secret key is never stored in its entirety on any single device.

Last updated 11 months ago

Was this helpful?

💫