Topics covered in this episode:
00:54 What are threshold signatures?
04:33 Example use-case: code signing.
06:50 Example use-case: asset custody.
11:08 Example use-case: validators.
14:30 What kind of signatures are usually thresholdized?
What makes Schnorr signatures easier to thresholdize: https://cronokirby.com/posts/2021/07/signatures_from_identification/
20:10 How distributed key generation works, at a high level.
27:34 On the utility of key refresh.
30:50 On the utility of pre-signatures
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.
Share this post