Key Generation

Key Generation takes place one time. At the end of that interactive protocol both parties have computed their secret shards which will be used during the signature computation later on. There is no further need to put shards on the network again other than using them during sign phase. The protocol for key generation is described in section 3.2 https://eprint.iacr.org/2017/552.pdf.

Messages between parties are sent within a secure authenticated channel already established between the parties. The messages per se do not expose private information during key generation

In addition, the two parties must agree on who is party 1, and who is party 2 before beginning the key generation steps.

Last updated