Threshold signature method and device, electronic equipment and readable storage medium
A threshold and node technology, applied in the information field, can solve problems such as signature failure and failure to identify malicious nodes, and achieve the effect of ensuring accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0076] Secret sharing can avoid the problem of key forgery due to the key held by the central node, but the current secret sharing has the following disadvantages: when the node uses the key signature, the key must be recovered according to the key fragmentation, then the key There is a risk of theft while restoring. The biggest feature of the threshold signature algorithm is that "the availability of the key is not visible". For example, in the threshold signature algorithm, the private key is shared by multiple nodes, each node holds a private key fragment in the private key, and each node can generate sign. Therefore, while the threshold signature algorithm provides key security, it also provides the availability of the key, so that the key is "available and invisible".
[0077] Blockchain is a decentralized or multi-centralized system, and it requires threshold keys in scenarios such as consensus mechanisms, joint payments, and voting. At present, most blockchains use t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


