Key splitting and distribution slows down any malicious attackers, as they would need to break into multiple locations to access the key.
Our key splitting process is better than prior methods like Verifiable Secret Sharing (VSS) or Shamir Secret Sharing. We created Distributed Key Generation for ultimate security and privacy.
Existing key splitting processes have flaws that we wanted to patch. For example, VSS creates the key in one location and then splits it to the receiving parties. If the key is generated in a compromised device then there is potential for someone to access the key.
To remedy this, we designed Distributed Key Generation as a multi-party computation protocol, meaning a key is generated between all of the devices virtually. Your critically important secret key is never held by any single device.
We eliminate the risks involved in any original form of key splitting.