Passport
  • 👩‍💻Welcome
  • How Passport Works
    • Overview
    • Background
      • Threshold Cryptography
      • Secure Multi-Party Computation
      • Distributed Architecture
      • Secure Enclaves
    • In Depth
      • Under the Hood
      • User Flows and Account Controls
      • The Halides Model
      • End-to-End Encryption
      • Security
      • Node Operation
  • guides and examples
    • Getting Started
    • Quickstarts and Examples
      • Passkey Account
      • Clerk Auth
      • Lambda Quickstart
  • Authentication
    • Overview
    • Configuring your scope
    • Passkeys
      • Registration
        • Register using SDK
        • Register using API
          • Initiate Registration
          • Complete Registration
      • Authentication
        • Authenticating with SDK
        • Authenticating with API
          • Initiate Authentication
          • Complete Authentication
    • Developer Owned Auth
      • Registration
        • Register using SDK
        • Register using API
          • Delegate Registration
  • Wallet Operations
    • Overview
    • Passkeys Signer
      • Sign Message
        • Sign Message SDK
        • Sign Message API
      • Sign Transaction
        • Sign Transaction SDK
        • Sign Transaction API
    • DOA Signer
      • Sign Message
        • Sign Message SDK
        • Sign Message API
      • Sign Transaction
        • Sign Transaction SDK
        • Sign Transaction API
    • Viem Support
  • Programmability
    • Overview
    • Passport Lambda
    • Lambda Functions
      • Create Lambda
        • Create Lambda SDK
        • Create Lambda API
      • Execute Lambda
        • Execute Lambda SDK
        • Execute Lambda API
      • List Lambda
        • List Lambda SDK
        • List Lambda API
  • Appendix
    • Moving to Mainnet
    • State Of The Network
    • Generating DOA Keys
    • API Request Setup
      • Unauthenticated Requests
      • Authenticated Requests
Powered by GitBook
On this page
  1. How Passport Works
  2. Background

Threshold Cryptography

Threshold cryptography is a foundational concept in modern cryptographic systems, offering robust security by distributing the management of private keys across multiple entities. At its core, this technique involves dividing a private key into several shares or fragments, each entrusted to a different participant or node within a network. Unlike traditional cryptographic approaches where a single entity holds complete control over the private key, threshold cryptography distributes this responsibility among a group of designated parties.

The key feature of threshold cryptography lies in its threshold requirement, wherein a predefined number of shares must be combined to reconstruct the original private key. This threshold, often denoted as ( t ), determines the minimum number of shares needed for cryptographic operations. For instance, if ( t ) is set to a value less than or equal to the total number of shares ( n ), the private key can only be reconstructed when at least ( t ) shares are collected. This threshold mechanism adds an additional layer of security, as the compromise of individual shares alone is insufficient to compromise the entire key.

One of the primary advantages of threshold cryptography is its resilience to attacks and compromises. By distributing key management responsibilities across multiple entities, threshold cryptography eliminates single points of failure. Even if some shares are compromised, lost, or accessed by malicious parties, the integrity of the system remains intact as long as the threshold requirement is not breached. This resilience makes threshold cryptography particularly well-suited for environments where security and fault tolerance are paramount, such as distributed systems, blockchain networks, and multi-party protocols.

Furthermore, threshold cryptography facilitates secure cryptographic operations such as signing and decryption. Once the threshold of shares is collected, the original private key can be reconstructed, enabling authorized parties to perform cryptographic operations without exposing the complete key. This ensures that sensitive cryptographic functions can be executed securely, even in scenarios where trust among participants may be limited.

In Passport Protocol, threshold cryptography serves as a cornerstone of the system's security architecture. By leveraging threshold signatures, distributed key generation, and other threshold-based algorithms, Passport Protocol enhances the security and resilience of cryptographic operations, mitigating risks associated with single points of failure and unauthorized access. Through the decentralized distribution of key management responsibilities, Passport Protocol achieves a high level of security and trustworthiness, making it suitable for a wide range of applications where privacy, integrity, and resilience are paramount.

PreviousBackgroundNextSecure Multi-Party Computation

Last updated 1 year ago