Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1152

Threshold Cryptography

What is Threshold Cryptography?

Threshold CryptographyA class of cryptographic schemes in which a secret key is split across n parties so that any t of them — but no smaller subset — can sign, decrypt, or perform any other key operation.


Threshold cryptography distributes a cryptographic capability — typically signing, decryption, or key generation — across n participants such that any t-of-n can collaborate to perform the operation while up to t-1 corrupted parties learn nothing. Constructions rely on secret sharing (Shamir, Feldman, Pedersen), threshold variants of RSA, ECDSA, EdDSA, BLS, or lattice-based schemes, and frequently use MPC to compute the protocol without ever reconstructing the secret. NIST is currently standardizing threshold cryptography through its NIST IR 8214 series. Real-world uses include key management for custodial wallets, distributed certificate authorities, threshold validators on proof-of-stake blockchains, and protection of high-value HSM keys.

Examples

  1. 01

    A 3-of-5 threshold ECDSA wallet that requires three executives to authorize any transaction.

  2. 02

    Ethereum staking pools using BLS threshold signatures to attest blocks without exposing individual keys.

Frequently asked questions

What is Threshold Cryptography?

A class of cryptographic schemes in which a secret key is split across n parties so that any t of them — but no smaller subset — can sign, decrypt, or perform any other key operation. It belongs to the Cryptography category of cybersecurity.

What does Threshold Cryptography mean?

A class of cryptographic schemes in which a secret key is split across n parties so that any t of them — but no smaller subset — can sign, decrypt, or perform any other key operation.

How does Threshold Cryptography work?

Threshold cryptography distributes a cryptographic capability — typically signing, decryption, or key generation — across n participants such that any t-of-n can collaborate to perform the operation while up to t-1 corrupted parties learn nothing. Constructions rely on secret sharing (Shamir, Feldman, Pedersen), threshold variants of RSA, ECDSA, EdDSA, BLS, or lattice-based schemes, and frequently use MPC to compute the protocol without ever reconstructing the secret. NIST is currently standardizing threshold cryptography through its NIST IR 8214 series. Real-world uses include key management for custodial wallets, distributed certificate authorities, threshold validators on proof-of-stake blockchains, and protection of high-value HSM keys.

How do you defend against Threshold Cryptography?

Defences for Threshold Cryptography typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Threshold Cryptography?

Common alternative names include: Threshold signing, Distributed key cryptography.

Related terms

See also