Torus Key Infrastructure splits a user’s key between a device, an input, and the Torus network. A user can reconstruct their key by combining any of the two.
User keys are split via a threshold scheme into “shares” secured on a mixture of authentication methods and user devices. A threshold number of shares are required to gain access to the key.