In the ever evolving field of threshold cryptography, securing key shares through multi-party computation (MPC) offers powerful protection against compromise. MPC at Lit ensures threshold-based signing remains secure, with no single party holding full key share access and all nodes running in TEEs. However, scaling with this security model poses