- Report this article
Priti Kumari, PhD
Priti Kumari, PhD
Post-Quantum Cryptography Researcher | Pioneering Future-Proof Security Solutions | Experienced in Blockchain Technology
Published Mar 20, 2023
+ Follow
Multi-party signatures are a type of digital signature scheme where multiple parties jointly sign a message. The signature is valid only if a sufficient number of parties participate in the signing process. Multi-party signatures are useful in situations where multiple parties need to sign a message, but it is not practical or desirable for all parties to be present and participate in the signing process. Threshold signatures are a common approach to multi-party signatures. In threshold signatures, each signing party generates a share of a secret key, and the signature is computed by combining a sufficient number of these shares. The number of shares required to generate a valid signature is determined by a threshold parameter, which can be set to any value less than the total number of parties. Threshold signatures provide increased security compared to traditional digital signatures, as an attacker would need to compromise multiple parties in order to forge a signature. Threshold signatures can also be used to provide additional privacy, as the identity of the signing parties can be kept anonymous. Multi-party signatures have important applications in fields such as distributed systems, blockchain technology, and secure multiparty computation.
Table 1 below provides comparison of four famous threshold signature schemes based on properties like Key generation, Signing, Signature Aggregation and Blockchains where that scheme is implemented-
Shamir’s Secret Sharing
Shamir's Secret Sharing is a cryptographic algorithm used to split a secret into multiple parts, called shares, which can be distributed among different parties. The algorithm was developed by Adi Shamir, an Israeli cryptographer, in 1979.
The basic idea behind Shamir's Secret Sharing is that a secret can be divided into n shares in such a way that any k of the shares (where k is less than or equal to n) can be combined to reconstruct the secret, but fewer than k shares reveal no information about the secret. This is known as a (k, n) threshold scheme. The following flowcharts explain Shamir's Secret Sharing with an example.
Recommended by LinkedIn
As mentioned in the above table, Cardano uses a modified version of Shamir's secret sharing scheme to secure its network in the following manner-
In the next article, we will talk about BLS Signatures.
Like
Celebrate
Support
Love
Insightful
Funny
17
1 Comment
Priti Kumari, PhD
Post-Quantum Cryptography Researcher | Pioneering Future-Proof Security Solutions | Experienced in Blockchain Technology
1y
- Report this comment
An avid reader can look into VSS (Verifiable Secret Sharing)-Verifiable secret sharing (VSS) is a cryptographic technique used to distribute a secret among a group of participants in a way that provides verifiability and non-malleability. In a VSS scheme, the participants receive shares of the secret, but they can also verify that their shares are correct and that no one else has received a different share.
1Reaction 2Reactions
To view or add a comment, sign in
More articles by Priti Kumari, PhD
-
Questions for Binance Exchange Listing
Feb 18, 2022
Questions for Binance Exchange Listing
Please consider answering the following questions before going for Listing on Binance Exchange- Please provide a…
9
1 Comment
Sign in
Stay updated on your professional world
Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Insights from the community
- Blockchain What promising research directions exist for sharding algorithms?
- Payment Systems What is Plasma and how does it improve blockchain payment scalability?
- Blockchain How can you address algorithmic bias in Blockchain?
- Blockchain You're faced with incompatible blockchain consensus mechanisms. How do you navigate this complex scenario?
- Blockchain You're navigating a blockchain project. How do you set realistic client expectations on transparency?
- Blockchain What is the best consensus algorithm for DAOs?
- Digital Transformation What are the main challenges and risks of implementing blockchain in digital transformation?
- Blockchain Your team is struggling to understand Blockchain technology. What can you do to get them up to speed?
- Blockchain Here's how you can simplify the concept of decentralization in Blockchain for a non-technical interviewer.
- Blockchain How do you make sure your blockchain works across domains?
Others also viewed
- The Synergy of Blockchain and AI: How Developers Combine the Technologies Brain Inventory 1y
- Blockchain and Smart Contracts – Indian Legal Status Vijay Pal Dalmia 4y
- Digital signature Authentication using Elliptic Curve Digital Signature Algorithm (ECDSA) Garima Singh 4mo
- Web3: The Evolution of the Digital Era Benjamin Arunda 1y
- How to avoid,'I dont need Blockchain, holy trap?' Rajesh Dhuddu 5y
- What Does Blockchain Have To Do With Intellectual Property? Precious Onuabuchi 6mo
- AICPrime- Super Blockchain: Can machine think? Nguyen Minh 1y
- DeFi Use Cases VPLedger: A General Analysis comparing with Ethereum Ronny Boesing 4y
- Blockchain Agreement: Understanding Consensus Algorithm Aastha Thakker 1mo
- 🚀 Mastering Blockchain Brilliance: Revolutionizing Secure Transactions with VenPep TechPulse 🌐 VenPep Solutions 5mo
Explore topics
- Sales
- Marketing
- IT Services
- Business Administration
- HR Management
- Engineering
- Soft Skills
- See All