trio-initiator
A Kotlin Multiplatform library for three-party Multi-Party Computation (MPC) operations as the initiator role. This module provides secure distributed key generation, signing, recovery, and key management across three parties using the SilentShard protocol.
The Trio Initiator wrapper enables secure three-party threshold signature operations where keys are split between:
Initiator (Mobile Device): Holds one key share and initiates operations
Peer 1 (Cloud Server): Holds the second key share
Peer 2 (Backup/Recovery Server): Holds the third key share
With three parties, you can perform operations with any two parties, providing fault tolerance and recovery capabilities. No single party ever has access to the complete private key.
A Kotlin Multiplatform library for three-party Multi-Party Computation (MPC) operations as the initiator role. This module provides secure distributed key generation, signing, recovery, and key management across three parties using the SilentShard protocol.
The Trio Initiator wrapper enables secure three-party threshold signature operations where keys are split between:
Initiator (Mobile Device): Holds one key share and initiates operations
Peer 1 (Cloud Server): Holds the second key share
Peer 2 (Backup/Recovery Server): Holds the third key share
With three parties, you can perform operations with any two parties, providing fault tolerance and recovery capabilities. No single party ever has access to the complete private key.
A Kotlin Multiplatform library for three-party Multi-Party Computation (MPC) operations as the initiator role. This module provides secure distributed key generation, signing, recovery, and key management across three parties using the SilentShard protocol.
The Trio Initiator wrapper enables secure three-party threshold signature operations where keys are split between:
Initiator (Mobile Device): Holds one key share and initiates operations
Peer 1 (Cloud Server): Holds the second key share
Peer 2 (Backup/Recovery Server): Holds the third key share
With three parties, you can perform operations with any two parties, providing fault tolerance and recovery capabilities. No single party ever has access to the complete private key.