Threshold Cryptography With Secure MPC Can Eliminate the Risk of Key Theft

Threshold cryptography using secure MPC can compute a particular result, such as the signature used to authorize a blockchain transaction by requiring just t of n shares, without having to reveal the secret shares between any of the parties. Threshold cryptography with secure MPC can use mathematical techniques to achieve NIST-approved algorithms such as RSA and DSA signatures, and AES enciphering and deciphering, without ever creating a conventional whole key. Eliminating the creation of a whole key on any physical or virtual machine, at any time, effectively eliminates the conventional risks of key theft from those devices.

Sepior’s implementations of threshold cryptography incorporate secret sharing, thresholds, and secure MPC to provide industry leading key management solutions that operate in completely virtualized environments, in concert with any physical or virtual client devices.

Sepior