Skip to main content

Ceremony Output Summary

After launching the ssv-dkg tool as shown above, it will commence a DKG ceremony with the selected operators. Following the successful completion of the DKG ceremony, several files have been generated and placed in the directory where the command was launched from:

ceremony-[timestamp]
├── 0..[nonce]-0x...[validator public key]
├── deposit_data.json
├── keyshares.json
└── proof.json
├── 0..[nonce]-0x...[validator public key] ...
├── deposit_data.json
├── keyshares.json
└── proof.json
.....
├── deposit_data.json # aggregated
├── keyshares.json # aggregated
└── proofs.json # aggregated

Files:

Proofs

An example of proofs.json structure:

[
{
"proof": {
"validator": "VALIDATOR_PUBKEY",
"encrypted_share": "ENCRYPTED_SHARE_FOR_I-TH_OPERATOR_IN_CEREMONY",
"share_pub": "PUB_KEY_OF_OPERATOR_THAT_ENCRYPTED_THE_SHARE",
"owner": "OWNER_ADDRESS_USED_IN_CEREMONY"
},
"signature": "CONTENT_OF_PROOF_SIGNED_BY_OPERATOR_PRIVATE_KEY"
},
{
"proof": {...},
"signature": "..."
},
...
]

Details about the structure:

  • Each validator will have X proofs, where X is the number of operators in the cluster
  • X proofs of a validator are in an array []
  • One file can contain proofs for multiple validators, by having nested arrays [[],[],[]]
  • Each proof has 4 parameters:
    • validator - validator's public key, not encrypted
    • encrypted_share- validator share for i-th operator, encrypted by operator's private key
    • share_pub - Public key of i-th operator, not encrypted
    • owner - Address of validator owner, not encrypted
  • Last parameter signature is the content of proof signed by private key of i-th operator.

How proofs secure the ceremony for both parties:

  • Owner/initiator can't change their owner address, because the address is part of proof's content and this is signed by operator's private key.
  • Operator signs the proof with their private key and the proof itself has their public key which can be used to verify the signature.

Keyshares

An example of keyshares.json structure:

{
"version": "v1.1.0",
"createdAt": "2025-05-14T10:23:43.794Z",
"shares": [
{
"data": {
"ownerNonce": 0,
"ownerAddress": "OWNER_ADDRESS",
"publicKey": "VALIDATOR_PUBKEY",
"operators": [
{
"id": 1,
"operatorKey": "OPERATOR_PUBKEY"
},
{...},
{...},
{...}
]
},
"payload": {
"publicKey": "VALIDATOR_PUBKEY",
"operatorIds": [1,2,3,4],
"sharesData": "ENCRYPTED_SHARES_DATA"
}
}
]
}

Details about sharesData field

Below is an example of sharesData from a Hoodi validator with 4 operators. Each segment is highlighted with color:

Explanation of each segment:

  • Signature - First 192 characters (excluding 0x) is a serialized BLS signed message (read more about SSZ here). The message itself is ownerAddress:ownerNonce, it's signed by the validator private key and consequently can be verified using validator's publicKey.
  • Shares' public keys - An array of concatenated BLS public keys. Each element is a public share of a validator's key and is 96 characters long. The number of shares depends on the number of chosen operators.
  • Encrypted shares - An array of concatenated BLS encrypted keys. Each element is a private share of a validator's key and is 512 characters long. The number of shares depends on the number of chosen operators. Shares are encrypted with each operator's public key and can only be decrypted with the respective private key.

If you want to learn more about keyshare verification, you can dissect verify-keyshare repository on GitHub:

  • validateSingleShares function in ssv-keys.ts does the signature verification.
  • buildSharesFromBytes function breaks down each operators' keyshare.
  • areKeysharesValid function then checks the signature and operators' keyshares agains the validator public key.