# Distributed Key Generation

Splitting and distributing and encryption key make hacking nearly impossible because an attacker would have to gain accross to multiple devices in multiple locations.&#x20;

Our process of key splitting improves upon traditional methods like Verifiable Secret Sharing (VSS) or Shamir Secret Sharing, leading to enhanced security and privacy through our novel Distributed Key Generation.&#x20;

Existing key splitting techniques have are risky when the key is generated in a single location prior to splitting and sending it to recipients. If the original device is compromised, there's a risk of the key being accessed.&#x20;

To circumvent this, we've devised Distributed Key Generation. This multi-party computation protocol ensures that the key is virtually generated across all devices, meaning your all-important secret key is never stored in its entirety on any single device.&#x20;
