# Overview

Vultisig's security is built on Threshold Signature Schemes (TSS), a form of Multi-Party Computation (MPC) that eliminates single points of failure. This section explains the cryptographic foundations and technical processes that secure your assets.

***

## Core Concepts

### No Private Key Ever Exists

Unlike traditional wallets, Vultisig never constructs a complete private key. Instead, cryptographic operations are performed across distributed vault shares using zero-knowledge proofs. Even during signing, the key remains split—only the signature is assembled.

### Threshold Security

Vultisig uses a `t`-of-`n` threshold model. For a 2-of-3 vault, any 2 devices can sign, but no single device can act alone. This provides both security (no single point of compromise) and redundancy (one device can be lost).

***

## TSS Protocols

Vultisig supports two TSS protocols:

| Protocol                                               | Status  | Signing Rounds | Speed        |
| ------------------------------------------------------ | ------- | -------------- | ------------ |
| [GG20](/security-and-technology/how-gg20-works.md)     | Legacy  | 6 rounds       | Baseline     |
| [DKLS23](/security-and-technology/how-dkls23-works.md) | Current | 3 rounds       | 5-10x faster |

New vaults use DKLS23 by default. Existing GG20 vaults can be [upgraded](/app-guide/vault-management/vault-upgrade.md).

***

## Key Operations

| Operation          | Description                            | Guide                                                  |
| ------------------ | -------------------------------------- | ------------------------------------------------------ |
| **Key Generation** | Creating vault shares across devices   | [TSS Actions](/security-and-technology/tss-actions.md) |
| **Key Signing**    | Threshold devices signing transactions | [Keysign](/security-and-technology/keysign.md)         |
| **Re-sharing**     | Adding/removing devices from a vault   | [TSS Actions](/security-and-technology/tss-actions.md) |

***

## Security Comparisons

Understanding how Vultisig compares to alternative approaches:

* [Difference to Multi-Signatures](/security-and-technology/difference-to-multi-sig.md) — Why TSS is superior to traditional multi-sig
* [Difference to Passkeys](/security-and-technology/difference-to-passkeys.md) — Why passkeys aren't suitable for crypto

***

## Emergency Procedures

In the unlikely event that Vultisig software becomes unavailable, vault shares can be recombined to extract a traditional private key:

* [Emergency Recovery](/security-and-technology/emergency-recovery.md) — Last-resort key extraction

{% hint style="danger" %}
Emergency recovery permanently converts a TSS vault to a single-signature wallet. Only use if Vultisig software is completely unavailable.
{% endhint %}

***

## Technical Deep Dives

{% content-ref url="/pages/hvh5VgnerNSmhqVKROpH" %}
[How DKLS23 Works](/security-and-technology/how-dkls23-works.md)
{% endcontent-ref %}

{% content-ref url="/pages/RwtjmmA2OjpBtiTJurvx" %}
[How GG20 Works](/security-and-technology/how-gg20-works.md)
{% endcontent-ref %}

{% content-ref url="/pages/hdg0XuEAf6kdr6axEQfy" %}
[TSS Actions](/security-and-technology/tss-actions.md)
{% endcontent-ref %}

{% content-ref url="/pages/byreqeVuoXVFweD2bV5v" %}
[Keysign](/security-and-technology/keysign.md)
{% endcontent-ref %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.vultisig.com/security-and-technology/overview.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
