
Sign up to save your podcasts
Or
Topics covered in this episode:
* 00:54 What are threshold signatures?
* 04:33 Example use-case: code signing.
* 06:50 Example use-case: asset custody.
* 11:08 Example use-case: validators.
* 14:30 What kind of signatures are usually thresholdized?
* What makes Schnorr signatures easier to thresholdize: https://cronokirby.com/posts/2021/07/signatures_from_identification/
* 20:10 How distributed key generation works, at a high level.
* 27:34 On the utility of key refresh.
* 30:50 On the utility of pre-signatures
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.
Topics covered in this episode:
* 00:54 What are threshold signatures?
* 04:33 Example use-case: code signing.
* 06:50 Example use-case: asset custody.
* 11:08 Example use-case: validators.
* 14:30 What kind of signatures are usually thresholdized?
* What makes Schnorr signatures easier to thresholdize: https://cronokirby.com/posts/2021/07/signatures_from_identification/
* 20:10 How distributed key generation works, at a high level.
* 27:34 On the utility of key refresh.
* 30:50 On the utility of pre-signatures
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.