The implemented schemes are prototypes and should not be used in production. They are used to assist in demonstrating threshold signatures (in other repos).
- Shamir secret sharing (Requires trusted third party)
- Pedersen verifiable secret sharing (Requires trusted third party)
- Pedersen decentralized verifiable secret sharing (Does not require a trusted party)
- More tests
- Model Pedersen DVSS as state machine