Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain (2024)

Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain (1)

  • Report this article

Priti Kumari, PhD Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain (2)

Priti Kumari, PhD

Post-Quantum Cryptography Researcher | Pioneering Future-Proof Security Solutions | Experienced in Blockchain Technology

Published Mar 20, 2023

+ Follow

Multi-party signatures are a type of digital signature scheme where multiple parties jointly sign a message. The signature is valid only if a sufficient number of parties participate in the signing process. Multi-party signatures are useful in situations where multiple parties need to sign a message, but it is not practical or desirable for all parties to be present and participate in the signing process. Threshold signatures are a common approach to multi-party signatures. In threshold signatures, each signing party generates a share of a secret key, and the signature is computed by combining a sufficient number of these shares. The number of shares required to generate a valid signature is determined by a threshold parameter, which can be set to any value less than the total number of parties. Threshold signatures provide increased security compared to traditional digital signatures, as an attacker would need to compromise multiple parties in order to forge a signature. Threshold signatures can also be used to provide additional privacy, as the identity of the signing parties can be kept anonymous. Multi-party signatures have important applications in fields such as distributed systems, blockchain technology, and secure multiparty computation.

Table 1 below provides comparison of four famous threshold signature schemes based on properties like Key generation, Signing, Signature Aggregation and Blockchains where that scheme is implemented-

Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain (3)

Shamir’s Secret Sharing

Shamir's Secret Sharing is a cryptographic algorithm used to split a secret into multiple parts, called shares, which can be distributed among different parties. The algorithm was developed by Adi Shamir, an Israeli cryptographer, in 1979.

The basic idea behind Shamir's Secret Sharing is that a secret can be divided into n shares in such a way that any k of the shares (where k is less than or equal to n) can be combined to reconstruct the secret, but fewer than k shares reveal no information about the secret. This is known as a (k, n) threshold scheme. The following flowcharts explain Shamir's Secret Sharing with an example.

Recommended by LinkedIn

Blockchain Verification Process: Explained SoluLab 1 year ago
Blockchain: from elite to everyday Naveen Joshi 6 years ago
Blockchain consensus algorithms Present Trends :… Garima Singh 4 months ago
Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain (7)
Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain (8)

As mentioned in the above table, Cardano uses a modified version of Shamir's secret sharing scheme to secure its network in the following manner-

  • The original secret is hashed using a cryptographic hash function to produce a random value, which is used as the seed to generate a sequence of public-private key pairs.
  • Each private key is then used to generate a transaction output that is publicly recorded on the blockchain.
  • These transaction outputs are randomly distributed among a set of participants, who each hold a single output.
  • To recover the original secret, a threshold number of participants must come together to reveal their transaction outputs and re-derive the private keys using the seed value.
  • This method provides a high level of security, as an attacker would need to compromise a threshold number of participants to recover the original secret.
  • This modified scheme is used to secure Cardano's network by ensuring that the private keys necessary to perform critical operations, such as confirming transactions and minting new coins, are securely distributed and protected from attack.

In the next article, we will talk about BLS Signatures.

Like
Comment

17

1 Comment

Priti Kumari, PhD

Post-Quantum Cryptography Researcher | Pioneering Future-Proof Security Solutions | Experienced in Blockchain Technology

1y

  • Report this comment

An avid reader can look into VSS (Verifiable Secret Sharing)-Verifiable secret sharing (VSS) is a cryptographic technique used to distribute a secret among a group of participants in a way that provides verifiability and non-malleability. In a VSS scheme, the participants receive shares of the secret, but they can also verify that their shares are correct and that no one else has received a different share.

Like Reply

1Reaction 2Reactions

To view or add a comment, sign in

More articles by Priti Kumari, PhD

  • Questions for Binance Exchange Listing

    Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain (18)

    Feb 18, 2022

    Questions for Binance Exchange Listing

    Please consider answering the following questions before going for Listing on Binance Exchange- Please provide a…

    Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain (19) 9

    1 Comment

Sign in

Stay updated on your professional world

Sign in

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

Insights from the community

  • Blockchain What promising research directions exist for sharding algorithms?
  • Payment Systems What is Plasma and how does it improve blockchain payment scalability?
  • Blockchain How can you address algorithmic bias in Blockchain?
  • Blockchain You're faced with incompatible blockchain consensus mechanisms. How do you navigate this complex scenario?
  • Blockchain You're navigating a blockchain project. How do you set realistic client expectations on transparency?
  • Blockchain What is the best consensus algorithm for DAOs?
  • Digital Transformation What are the main challenges and risks of implementing blockchain in digital transformation?
  • Blockchain Your team is struggling to understand Blockchain technology. What can you do to get them up to speed?
  • Blockchain Here's how you can simplify the concept of decentralization in Blockchain for a non-technical interviewer.
  • Blockchain How do you make sure your blockchain works across domains?

Others also viewed

  • The Synergy of Blockchain and AI: How Developers Combine the Technologies Brain Inventory 1y
  • Blockchain and Smart Contracts – Indian Legal Status Vijay Pal Dalmia 4y
  • Digital signature Authentication using Elliptic Curve Digital Signature Algorithm (ECDSA) Garima Singh 4mo
  • Web3: The Evolution of the Digital Era Benjamin Arunda 1y
  • How to avoid,'I dont need Blockchain, holy trap?' Rajesh Dhuddu 5y
  • What Does Blockchain Have To Do With Intellectual Property? Precious Onuabuchi 6mo
  • AICPrime- Super Blockchain: Can machine think? Nguyen Minh 1y
  • DeFi Use Cases VPLedger: A General Analysis comparing with Ethereum Ronny Boesing 4y
  • Blockchain Agreement: Understanding Consensus Algorithm Aastha Thakker 1mo
  • 🚀 Mastering Blockchain Brilliance: Revolutionizing Secure Transactions with VenPep TechPulse 🌐 VenPep Solutions 5mo

Explore topics

  • Sales
  • Marketing
  • IT Services
  • Business Administration
  • HR Management
  • Engineering
  • Soft Skills
  • See All
Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain (2024)
Top Articles
Frequently Asked Questions
How to Get Over Someone
9.4: Resonance Lewis Structures
Woodward Avenue (M-1) - Automotive Heritage Trail - National Scenic Byway Foundation
Ets Lake Fork Fishing Report
Blanchard St Denis Funeral Home Obituaries
THE 10 BEST Women's Retreats in Germany for September 2024
Sissy Transformation Guide | Venus Sissy Training
Evita Role Wsj Crossword Clue
Canelo Vs Ryder Directv
Weather In Moon Township 10 Days
Ladyva Is She Married
How to watch free movies online
REVIEW - Empire of Sin
Readyset Ochsner.org
Nonne's Italian Restaurant And Sports Bar Port Orange Photos
Voy Boards Miss America
Pekin Soccer Tournament
How To Level Up Roc Rlcraft
Danforth's Port Jefferson
Jeff Now Phone Number
Poe Str Stacking
Cincinnati Adult Search
PCM.daily - Discussion Forum: Classique du Grand Duché
MyCase Pricing | Start Your 10-Day Free Trial Today
Reser Funeral Home Obituaries
Roanoke Skipthegames Com
Dashboard Unt
Jackass Golf Cart Gif
They Cloned Tyrone Showtimes Near Showbiz Cinemas - Kingwood
County Cricket Championship, day one - scores, radio commentary & live text
Rogold Extension
Fastpitch Softball Pitching Tips for Beginners Part 1 | STACK
Homewatch Caregivers Salary
L'alternativa - co*cktail Bar On The Pier
Miss America Voy Board
#1 | Rottweiler Puppies For Sale In New York | Uptown
Games R Us Dallas
Build-A-Team: Putting together the best Cathedral basketball team
Why Gas Prices Are So High (Published 2022)
Has any non-Muslim here who read the Quran and unironically ENJOYED it?
Letter of Credit: What It Is, Examples, and How One Is Used
Actor and beloved baritone James Earl Jones dies at 93
The Wait Odotus 2021 Watch Online Free
Satucket Lectionary
Nimbleaf Evolution
Hello – Cornerstone Chapel
Fine Taladorian Cheese Platter
Goosetown Communications Guilford Ct
Parks And Rec Fantasy Football Names
Lsreg Att
La Fitness Oxford Valley Class Schedule
Latest Posts
Article information

Author: Rev. Leonie Wyman

Last Updated:

Views: 6240

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Rev. Leonie Wyman

Birthday: 1993-07-01

Address: Suite 763 6272 Lang Bypass, New Xochitlport, VT 72704-3308

Phone: +22014484519944

Job: Banking Officer

Hobby: Sailing, Gaming, Basketball, Calligraphy, Mycology, Astronomy, Juggling

Introduction: My name is Rev. Leonie Wyman, I am a colorful, tasty, splendid, fair, witty, gorgeous, splendid person who loves writing and wants to share my knowledge and understanding with you.