Security & Technology

How Vultisig security works. Threshold Signature Schemes (TSS), DKLS23 protocol, keysigning process, and cryptographic foundations explained.

Vultisig's security is built on Threshold Signature Schemes (TSS), a form of Multi-Party Computation (MPC) that eliminates single points of failure. This section explains the cryptographic foundations and technical processes that secure your assets.


Core Concepts

No Private Key Ever Exists

Unlike traditional wallets, Vultisig never constructs a complete private key. Instead, cryptographic operations are performed across distributed vault shares using zero-knowledge proofs. Even during signing, the key remains split—only the signature is assembled.

Threshold Security

Vultisig uses a t-of-n threshold model. For a 2-of-3 vault, any 2 devices can sign, but no single device can act alone. This provides both security (no single point of compromise) and redundancy (one device can be lost).


TSS Protocols

Vultisig supports two TSS protocols:

Protocol
Status
Signing Rounds
Speed

Legacy

6 rounds

Baseline

Current

3 rounds

5-10x faster

New vaults use DKLS23 by default. Existing GG20 vaults can be upgraded.


Key Operations

Operation
Description
Guide

Key Generation

Creating vault shares across devices

Key Signing

Threshold devices signing transactions

Re-sharing

Adding/removing devices from a vault


Security Comparisons

Understanding how Vultisig compares to alternative approaches:


Emergency Procedures

In the unlikely event that Vultisig software becomes unavailable, vault shares can be recombined to extract a traditional private key:


Technical Deep Dives

How DKLS23 WorksHow GG20 WorksTSS ActionsKeysign

Last updated

Was this helpful?