Threshold Key Derivation - Privacy on the IC

Hi here is an article that may help you understand how it works.

1 Like