NOTE: this is still a draft, so it's subject to changes. This alert will be removed as soon as final version will be available

πŸ“@hsuite/dkg-types - Distributed Key Generation Type Definitions

πŸ” Comprehensive TypeScript type definitions for Distributed Key Generation with threshold cryptography and Shamir's Secret Sharing

Enterprise-grade type definitions and interfaces providing a complete distributed key generation (DKG) system with threshold cryptography, secure share distribution, member coordination, and protocol message handling for cryptographic operations.


πŸ“š Table of Contents


✨ Quick Start

Installation

npm install @hsuite/dkg-types

Basic Setup

NestJS Integration


πŸ—οΈ Architecture

Core Component Areas

πŸ” Threshold Cryptography

  • Shamir's Secret Sharing - Secure secret splitting with threshold reconstruction

  • Share Distribution - Safe distribution of cryptographic shares among participants

  • Secret Reconstruction - Threshold-based secret recovery from distributed shares

  • Verification Vectors - Cryptographic proof for share validity and integrity

🌐 Network Coordination

  • Cluster Management - Coordinated group operations and state synchronization

  • Node Participation - Individual participant management and communication

  • Member Coordination - Protocol state management and share coordination

  • Status Lifecycle - Complete cluster state transitions from building to ready

πŸ“‘ Protocol Communication

  • Payload Management - Structured message formats for DKG protocol communication

  • State Synchronization - Consistent state management across network participants

  • Message Validation - Type-safe protocol message handling and verification

  • Secure Channels - Protected communication between DKG participants

πŸ›‘οΈ Security Features

  • Share Integrity - Cryptographic validation of distributed shares

  • Member Authentication - Participant identity verification and management

  • Secure Distribution - Protected share distribution mechanisms

  • Threshold Security - Configurable security thresholds for key reconstruction

Dual Namespace System

πŸ”§ IDKG Namespace (Interfaces)

  • Type Definitions - Pure TypeScript interfaces for cryptographic operations

  • Protocol Structures - DKG protocol message and state interfaces

  • Network Interfaces - Cluster and node management interfaces

  • Cryptographic Types - Threshold cryptography and secret sharing interfaces

πŸ›οΈ DKG Namespace (Models)

  • Runtime Validation - Concrete classes with built-in cryptographic validation

  • Swagger Integration - Complete API documentation decorators

  • Protocol Implementation - Concrete DKG protocol implementations

  • Secure Operations - Validated cryptographic operations and state management

Module Structure


πŸ”§ API Reference

Core Interface Types

Network Status Types

IDKG.NetworkClusterStatus

Cryptographic Types

IDKG.IShamirSecretShare

  • Purpose: Shamir's Secret Sharing scheme implementation interface

  • Features: Secret splitting, threshold reconstruction, share validation

  • Usage: Secure secret distribution among DKG participants

IDKG.IMemberShare

  • Purpose: Individual member share management interface

  • Properties: Share identification, ownership tracking, validation

  • Usage: Share distribution and lifecycle management

Network Participant Types

IDKG.INode

  • Purpose: DKG network participant interface

  • Properties: operator, id, sn_id, vvec

  • Usage: Node identification and verification vector management

IDKG.IMember

  • Purpose: DKG protocol member interface

  • Properties: dkgId, membersShares, verificationVector, secretKeyShare

  • Usage: Member state and cryptographic operations

IDKG.ICluster

  • Purpose: DKG cluster coordination interface

  • Properties: networkId, members, memberships, groupsVvec, threshold

  • Usage: Group operations and threshold management

Status Transition Matrix

Current Status
Allowed Transitions
Description

BUILDING

CONTRIBUTIONS_READY, BANNING

Initial setup completion

CONTRIBUTIONS_READY

READY, ROTATING, BANNING

Accept contributions

READY

ROTATING, BANNING

Normal operations

ROTATING

READY, BANNING

Member changes

BANNING

BUILDING, READY

Member removal

Threshold Configuration

Participants
Recommended Threshold
Security Level
Use Case

3-5

2

Basic

Development/Testing

5-10

3-4

Standard

Production Systems

10-20

5-7

High

Enterprise Networks

20+

8+

Maximum

Critical Infrastructure


πŸ“– Guides

DKG Protocol Implementation Guide

Complete guide to implementing distributed key generation protocols. This covers the full DKG workflow from cluster initialization through key generation, including participant coordination, contribution handling, verification vector management, and threshold cryptography implementation.

Threshold Cryptography Guide

Learn Shamir's Secret Sharing and threshold-based cryptographic operations. This includes secret splitting algorithms, share distribution mechanisms, threshold reconstruction techniques, verification vector creation, and cryptographic proof generation for secure multi-party computations.

Network Coordination Guide

Set up cluster management and participant coordination. This covers cluster state management, member lifecycle handling, network topology configuration, communication protocol implementation, and distributed consensus mechanisms for DKG operations.

Security Best Practices Guide

Implement secure DKG operations and protect against attacks. This includes participant authentication, share integrity verification, secure communication channels, malicious actor detection, byzantine fault tolerance, and cryptographic security best practices.


🎯 Examples

Basic DKG Cluster Setup

Shamir's Secret Sharing Implementation

Member Coordination and State Management

Protocol Message Handling


πŸ”— Integration

Required Dependencies

Module Integration

Documentation Generation

Integration with HSuite Ecosystem

Use Cases

πŸ” Distributed Key Management

  • Multi-party key generation without single points of failure

  • Threshold-based secret reconstruction for enhanced security

  • Secure share distribution among trusted participants

  • Cryptographic proof and verification systems

🏒 Enterprise Security Infrastructure

  • Multi-signature wallet implementations

  • Distributed certificate authorities

  • Secure multi-party computation protocols

  • Enterprise-grade cryptographic operations

🌐 Blockchain Network Security

  • Validator key generation for consensus networks

  • Distributed custody solutions for digital assets

  • Cross-chain bridge security mechanisms

  • Network governance key management

⚑ High-Availability Systems

  • Fault-tolerant cryptographic operations

  • Disaster recovery key reconstruction

  • Geographic distribution of key shares

  • Scalable threshold cryptography implementations


πŸ” Enterprise Cryptography: Comprehensive TypeScript definitions for distributed key generation with threshold cryptography and Shamir's Secret Sharing.

πŸ›‘οΈ Security-First Design: Complete security validation, share integrity verification, and cryptographic proof systems.

🌐 Network Coordination: Advanced cluster management, member coordination, and protocol state synchronization.


Built with ❀️ by the HSuite Team Copyright © 2025 HSuite. All rights reserved.

Last updated