Advantages
Even if a portion of the network is paralyzed or some important shares are lost, the entire system maintains stability and security. To reduce the threat posed by key share exposure, every validator’s key share is updated regularly or when a triggering circumstance is satisfied.
Last updated