Factors Affecting the Selection of TSS

As discussed before, three sets of TSS algorithms are battle-tested, and their variants are well-used across applications:

In practice, what algorithm to choose is a function of system constraints:

  1. Number of parties participating in distributed key generation and signatures,

  2. Connectivity, liveliness assumptions, on the parties during DKG and signatures

  3. Type of computing nodes (with key shares) (server, smartphones, laptops, low compute devices, etc)

  4. Signature Curves (ECDSA, EdDSA).

On top of these, quantifiable parameters like a) computation time and b) message bandwidth play decisive roles as well.

Last updated