Concepts

Concepts

The following sections explore the core concepts of Entropy.

Key management
This page explains the process for periodically substituting signers, swapping keyshares, and other processes the network uses to manage keys.
Network setup
This page covers how the Entropy network functions from a conceptual standpoint. For techincal and actionable information on the various Entropy networks, check out the [Networks reference …
Programs
The purpose of an Entropy program is to determine whether a group of nodes should generate a signature or not. Developers can create and deploy programs, but validator nodes are the only agents that …
Registering
This section explains the technical steps involved in registering a user account on the Entropy network, including the selection of programs and configurations, and the generation of a verifying key.
Security
Entropy leverages cutting-edge cryptographic techniques and distributed systems principles to deliver a highly secure network. Learn more about our security architecture and protocols.
Signing
This section delves into the technical details of the signing process, including the interaction between users, relayer nodes, and the signing committee, as well as the underlying threshold signature …
Threshold Signature Scheme
This section provides a technical overview of the threshold signature scheme employed by Entropy, highlighting its key features, security properties, and the underlying cryptographic primitives.
Validators
This section provides a technical overview of the validator nodes that power the Entropy network, focusing on the roles of the Entropy blockchain and the threshold signature server.