Think of dEOAs as advanced versions of traditional blockchain accounts, with an emphasis on decentralization.
They have no private keys. Instead, their "ownership" and control are spread across multiple participants via cryptographic means.
Proposers and Participants:
These are the stakeholders in a dEOA. While participants represent the collective identity of a dEOA, any of them can become a proposer to initiate actions for the dEOA.
Whether members of a DAO or individual accounts, participants use traditional EOAs to interact and manage their position within the dEOA.
Key Shares:
Each participant holds a key share, intrinsically linked to the dEOA.
Alone, these key shares can't control the dEOA. When combined with others, they give authoritative power over the dEOA's actions.
Threshold Signatures:
The gold standard of dEOA activity validation.
Not every participant needs to sign every action. Instead, once a pre-set majority (or threshold) is reached, the action is authenticated.
This sophisticated approach is more scalable than traditional multisignatures.
Communication & Security:
By design, the protocol assumes all communication could potentially be public and vulnerable. The core design counters this with advanced encryption and on-chain data storage.
Developers have the flexibility to leverage other decentralized channels like LibP2P or even conventional channels like SMS.
At its core, key resharing periodically redistributes power among dEOA participants. It's a dynamic, cryptographic method to enhance security and adaptability.
Key resharing can:
Recover compromised accounts.
Facilitate the dynamic addition/removal of participants.
Periodically reset security, enhancing the account’s resistance to potential threats.
Initiating a Reshare:
Much like a transaction proposal, key resharing starts with a suggestion.
It requires a distinct threshold, often more significant than standard transactions, ensuring broader consensus for resharing activities.
Participation in Resharing:
For participants, the resharing approval process mimics that of transaction validation.
Upon consensus, the protocol rejuvenates the dEOA with new key shares, keeping its integrity intact.