TSS Actions

TSS operations explained: Key Generation (vault creation), Key Signing (transactions), and Resharing (device changes). Core MPC actions.

Vultisig's Threshold Signature Scheme supports three core operations:

  1. Key Generation

  2. Key Signing

  3. Re-Sharing


Key Generation

Key generation (keygen) is the process by which devices prove access to a secret and generate a shared public key. This requires 100% of devices to be online.

The shared public key creates on-chain addresses (the "vault") for receiving funds. These addresses resemble simple wallet addresses (externally-owned accounts) and do not appear as special contracts or scripts.


Key Signing

Key signing is the process where a threshold of parties (67% minimum) collaborate to prove access to a secret and generate a signed transaction.

For a 2-of-3 vault, only 2 of 3 devices need to participate. This ensures the signing process remains secure and efficient while maintaining vault integrity.

The signing process:

  1. Initiating device creates transaction payload

  2. Threshold devices join via QR code or relay

  3. Devices jointly compute signature shares

  4. Signature is assembled and transaction broadcasts

See Keysign for detailed signing procedures.


Re-share

Re-sharing allows the vault configuration to adapt by replacing devices or modifying the threshold.

Use cases:

  • Adding devices: Upgrade from 2-of-2 to 2-of-3 or 3-of-4

  • Removing devices: Exclude a lost or compromised device

  • Replacing devices: Substitute a non-responsive device with a new one

Re-sharing requires the current signing threshold. For a 2-of-3 vault, at least 2 devices must participate in the reshare ceremony.

See Vault Reshare for step-by-step instructions.


Last updated

Was this helpful?