Distributed Key Generation

Splitting and distributing and encryption key make hacking nearly impossible because an attacker would have to gain accross to multiple devices in multiple locations.

Our process of key splitting improves upon traditional methods like Verifiable Secret Sharing (VSS) or Shamir Secret Sharing, leading to enhanced security and privacy through our novel Distributed Key Generation.

Existing key splitting techniques have are risky when the key is generated in a single location prior to splitting and sending it to recipients. If the original device is compromised, there's a risk of the key being accessed.

To circumvent this, we've devised Distributed Key Generation. This multi-party computation protocol ensures that the key is virtually generated across all devices, meaning your all-important secret key is never stored in its entirety on any single device.

Last updated