Computer Applications and Software, Volume. 42, Issue 4, 345(2025)
DECENTRALIZED THRESHOLD SIGNATURE SCHEME IN BLOCKCHAIN TRANSACTIONS
[1] [1] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. [2022-03-12]. http://bitcoin.org/bitcoin.pdf.
[2] [2] Oosthoek K, Doerr C. From Hodl to heist: Analysis of cyber security threats to bitcoin exchanges[C]//IEEE International Conference on Blockchain & Cryptocurrency, 2020: 1-9.
[8] [8] Liyan W, Gao J T, Li X I. Efficient bitcoin password-protected wallet scheme with key-dependent message security[J]. International Journal of Network Security, 2019, 21 (5): 774-784.
[10] [10] Maxwell G, Poelsyra A, Seurin Y, et al. Simple Schnorr multi-signatures with applications to bitcoin[J]. Designs, Codes and Cryptography, 2019, 87(9): 2139-2164.
[11] [11] Fan C I, Tseng Y F, Su H P, et al. Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks[J]. International Journal of Information Security, 2020, 19(9): 245-255.
[12] [12] Pasikowski K. Secure Bitcoin wallet based on multicomponent authentication[D]. Silesia: University of Silesia in Katowice, 2020.
[13] [13] Xiao R Y, Ren W, Zhu T Q, et al. A mixing scheme using a decentralized signature protocol for privacy protection in bitcoin blockchain[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 18(4): 1793-1903.
[14] [14] Castagnos G, Catalano D, Laguillaumie F, et al. Two-party ECDSA from hash proof systems and efficient instantiations[C]//Annual International Cryptology Conference, 2019: 191-221.
[15] [15] Nick J, Ruffing T, Seurin Y, et al. MuSig-DN: Schnorr multi-signatures with verifiably deterministic nonces[C]//ACM SIGSAC Conference on Computer and Communications Security, 2020: 1717-1731.
[16] [16] Lindell Y, Nof A. Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody[C]//ACM SIGSAC Conference on Computer and Communications Security, 2018: 1837-1854.
[17] [17] Doerner J, Kondi Y, Lee E, et al. Threshold ECDSA from ECDSA assumptions: The multiparty case[C]//IEEE Symposium on Security and Privacy, 2019: 1051-1066.
[18] [18] Gennaro R, Goldfeder S. Fast multiparty threshold ECDSA with fast trustless setup[C]//ACM SIGSAC Conference on Computer and Communications Security, 2018: 1179-1194.
[19] [19] Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
[20] [20] Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001, 1(1): 36-63.
[21] [21] Rivest R L, Shamir A, Adleman L, et al. A method for obtaining digital sinatures and public key cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120-126.
[22] [22] Eigamal T. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE transactions on information theory, 1985, 31(4): 469-472.
[23] [23] Goldreich O. The fundamental of cryptography: Basic applications[M]. London: Cambridge University Press, 2004.
Get Citation
Copy Citation Text
Liu Xin, Hu Xiangyu, Xu Gang, Chen Xiubo. DECENTRALIZED THRESHOLD SIGNATURE SCHEME IN BLOCKCHAIN TRANSACTIONS[J]. Computer Applications and Software, 2025, 42(4): 345
Category:
Received: Oct. 17, 2021
Accepted: Aug. 25, 2025
Published Online: Aug. 25, 2025
The Author Email: