Factors Affecting the Selection of TSS
As discussed before, three sets of TSS algorithms are battle-tested, and their variants are well-used across applications:
In practice, what algorithm to choose is a function of system constraints:
Number of parties participating in distributed key generation and signatures,
Connectivity, liveliness assumptions, on the parties during DKG and signatures
Type of computing nodes (with key shares) (server, smartphones, laptops, low compute devices, etc)
Signature Curves (ECDSA, EdDSA).
Last updated