Listen

Description

Topics covered in this episode:

* 00:54 What are threshold signatures?

* 04:33 Example use-case: code signing.

* 06:50 Example use-case: asset custody.

* 11:08 Example use-case: validators.

* 14:30 What kind of signatures are usually thresholdized?

* What makes Schnorr signatures easier to thresholdize: https://cronokirby.com/posts/2021/07/signatures_from_identification/

* 20:10 How distributed key generation works, at a high level.

* 27:34 On the utility of key refresh.

* 30:50 On the utility of pre-signatures

If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:

If you want even more updates, feel free to follow me on Twitter.



This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit cronokirby.substack.com