# Difference to Multi-Signatures

The main difference between Threshold Signature Schemes (TSS) and Multi-Signatures (MS) lies in their approach to generating signatures. In TSS, the signature is created by combining vault shares using Zero-Knowledge Proofs—no single private key is ever constructed. In contrast, MS involves multiple private keys, each contributing to the final signature.

***

## Visualization: Threshold Signatures

<div align="center"><figure><picture><source srcset="/files/SpCVG9FDIpiA0S05y6w4" media="(prefers-color-scheme: dark)"><img src="/files/juFozoMBXF1z3sUGdN0h" alt="" width="375"></picture><figcaption><p><strong>Threshold Signatures</strong></p></figcaption></figure></div>

## Visualization: Multi-Signatures

<figure><picture><source srcset="/files/3RW4T26lVXcTcx5XY73u" media="(prefers-color-scheme: dark)"><img src="/files/I2LHBIcb0359Hrz2bN1e" alt="" width="375"></picture><figcaption><p><strong>Multi-Signatures</strong></p></figcaption></figure>

***

## Comparison

| Factor                  | Threshold Signature Scheme                            | Multi-Signature                       |
| ----------------------- | ----------------------------------------------------- | ------------------------------------- |
| **Private Key Storage** | No private key constructed; uses vault shares and ZKP | Multiple private keys held by parties |
| **On-Chain Footprint**  | Single signature on-chain                             | Multiple signatures visible on-chain  |
| **Redundancy**          | High; lost shares can be re-shared                    | Low; lost keys require fund migration |
| **Compatibility**       | Multi-chain: ECDSA and EdDSA                          | Single chain support                  |
| **Flexibility**         | Adjustable thresholds, replaceable devices            | Fixed once created                    |
| **Adding Participants** | Supported                                             | Not supported                         |

***

## Key Advantages of TSS

### No Key Reconstruction

In TSS, the private key never exists in one place. Multi-sig requires each signer to hold a complete private key, creating multiple single points of failure.

### Chain Agnostic

TSS works identically across all blockchains that support standard signatures. Multi-sig implementations vary by chain and often aren't available.

### Lower Fees

TSS produces a single signature regardless of threshold. Multi-sig requires multiple on-chain signatures, increasing transaction fees.

### Better Privacy

TSS transactions appear identical to normal single-signature transactions. Multi-sig transactions expose the signing structure on-chain.

### Flexibility

TSS allows resharing to add/remove devices without changing addresses. Multi-sig typically requires fund migration for any configuration change.

***

## Conclusion

Flexibility and security advantages make TSS the superior approach for managing digital assets compared to traditional multi-signature schemes.

***

## Related

* [How DKLS23 Works](/security-and-technology/how-dkls23-works.md)
* [TSS Actions](/security-and-technology/tss-actions.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.vultisig.com/security-and-technology/difference-to-multi-sig.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
