Optimal Threshold Signatures in Bitcoin
- URL: http://arxiv.org/abs/2509.25408v1
- Date: Mon, 29 Sep 2025 19:04:19 GMT
- Title: Optimal Threshold Signatures in Bitcoin
- Authors: Korok Ray, Sindura Saraswathi,
- Abstract summary: We formulate the design of a threshold signature scheme as made possible on cryptocurrency protocols like Bitcoin.<n>A user designs this scheme knowing that a malicious attacker can also obtain the signatures with some probability.<n> Interventions like increasing the security or usability of the signatures allow for higher thresholds.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We formulate the design of a threshold signature scheme as made possible on cryptocurrency protocols like Bitcoin. The funds are secured by an m-of-n threshold signature, where at least m signatures are needed to unlock the funds. A user designs this scheme knowing that a malicious attacker can also obtain the signatures with some probability. Higher thresholds offer more security, but also risk locking the user out of his own funds. The optimal threshold balances these twin effects. Interventions like increasing the security or usability of the signatures allow for higher thresholds. We model dynamic threshold signature schemes, where the probability of a user or attacker obtaining signatures decays with time. A dynamic threshold signature scheme is optimal, and increasing security or usability allows for higher thresholds and longer time locks.
Related papers
- LTRAS: A Linkable Threshold Ring Adaptor Signature Scheme for Efficient and Private Cross-Chain Transactions [10.430034734997726]
We propose a Linkable Threshold Ring Adaptor Signature scheme.<n>It integrates the conditional binding of adaptor signatures, the multi-account payment of threshold ring signatures, and the linkability for preventing double-spending.<n>It achieves significantly lower computation and communication overhead compared to existing schemes in large ring sizes and multi-account payment scenarios.
arXiv Detail & Related papers (2026-02-05T08:20:59Z) - One Signature, Multiple Payments: Demystifying and Detecting Signature Replay Vulnerabilities in Smart Contracts [56.94148977064169]
lacking checks on signature usage conditions can lead to repeated verifications, increasing the risk of permission abuse and threatening contract assets.<n>We define this issue as the Signature Replay Vulnerability (SRV)<n>From 1,419 audit reports across 37 blockchain security companies, we identified 108 with detailed SRV descriptions and classified five types of SRVs.
arXiv Detail & Related papers (2025-11-12T09:17:13Z) - A Time-Bound Signature Scheme for Blockchains [0.0]
We introduce a modified Schnorr signature scheme to allow for time-bound signatures for transaction fee auction bidding and smart contract purposes.<n>We show the use of such a signature scheme leads to lower MEV revenue for builders.
arXiv Detail & Related papers (2025-10-04T06:26:52Z) - A Smart Contract-based Non-Transferable Signature Verification System using Nominative Signatures [1.9662978733004597]
We propose a smart contract-based non-transferable signature verification system using nominative signatures.<n>Our system can verify whether a money transfer actually will take place, in addition to indicating who can verify a signature.
arXiv Detail & Related papers (2025-06-20T22:54:13Z) - The NeRF Signature: Codebook-Aided Watermarking for Neural Radiance Fields [77.76790894639036]
We propose NeRF Signature, a novel watermarking method for NeRF.<n>We employ a Codebook-aided Signature Embedding (CSE) that does not alter the model structure.<n>We also introduce a joint pose-patch encryption watermarking strategy to hide signatures into patches.
arXiv Detail & Related papers (2025-02-26T13:27:49Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a novel quantum digital signature protocol without a trusted third-party.<n>We prove that the protocol has information-theoretical unforgeability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.<n>Our measurements from the Aptos mainnet show that the optimistic approach reduces latency overhead by 71%.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - SQIAsignHD: SQIsignHD Adaptor Signature [0.6708691048956046]
We introduce $mathsfSQIAsignHD$, a new quantum-resistant adaptor signature scheme based on isogenies of supersingular elliptic curves.<n>We exploit the idea of the artificial orientation on the supersingular isogeny Diffie-Hellman key exchange protocol, SIDH, to define the underlying hard relation.
arXiv Detail & Related papers (2024-04-13T15:25:28Z) - Revocable Quantum Digital Signatures [57.25067425963082]
We define and construct digital signatures with revocable signing keys from the LWE assumption.
In this primitive, the signing key is a quantum state which enables a user to sign many messages.
Once the key is successfully revoked, we require that the initial recipient of the key loses the ability to sign.
arXiv Detail & Related papers (2023-12-21T04:10:07Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - Quotable Signatures for Authenticating Shared Quotes [0.8875650122536799]
Quotable signature schemes are digital signature schemes with the additional property that from the signature for a message, any party can extract signatures for (allowable) quotes from the message.
We define a notion of security for quotable signature schemes and construct a concrete example of a quotable signature scheme.
We consider both how quotable signatures can be used, and why using them could help mitigate the effects of fake news.
arXiv Detail & Related papers (2022-12-21T12:07:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.