版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:School of Computing Engineering and the Built Environment Edinburgh Napier University Edinburgh United Kingdom Cybersecurity Center Prince Mohammad Bin Fahd University Alkhobar Saudi Arabia Department of Computer Science Lahore University of Management Sciences Punjab Lahore Pakistan
出 版 物:《arXiv》 (arXiv)
年 卷 期:2025年
核心收录:
摘 要:Threshold Signature Scheme (TSS) protocols have gained significant attention over the past ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder s TSS protocol. Since then, various TSS protocols have been introduced with different features, such as security and performance, etc. Large organizations are using TSS protocols to protect many digital assets, such as cryptocurrency. However, the adoption of these TSS protocols requires an understanding of state-of-the-art research in threshold signing. This study describes the holistic view of TSS protocols, evaluates cutting-edge TSS protocols, highlights their characteristics, and compares them in terms of security and performance. The evaluation of these TSS protocols will help the researchers address real-world problems by considering the relevant merits of different TSS protocols. © 2025, CC BY-NC-ND.