Also called Schnorr MPC Signature
(2,3) Threshold Signature:
3 people, each one holding 1 secret share.
Any 2 of them can communicate with each other and generate a valid signature, without revealing its secret share.
Compatible with single-party signature. You cannot find differences between their output signatures.
Schnorr ∑-protocol is easier to understand
The Schnorr signature scheme is obtained by making the Schnorr ∑-protocol non-interactive using the Fiat-Shamir heuristic, where the challenge c
is derived from the message m
and the commitment r
using a hash function.
Secret Sharing is a common component of Threshold Signature
In $$(t,n)$$ threshold signature, the first step is to divide the secret key $$s$$ into $$n $$ shares, any $$t$$shares can recover the secret key
Dealer: