[HTML][HTML] Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain

J Tian, Y Zhao, X Yang, X Zhao, R Chen… - High-Confidence …, 2024 - Elsevier
Identity-based threshold signature (IDTHS) allows a threshold number of signers to generate
signatures to improve the deterministic wallet in the blockchain. However, the IDTHS …

Accountable and secure threshold EdDSA signature and its applications

Y Xie, Q Fan, C Zhang, T Wu, Y Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Threshold signatures as a method to realize multi-party cooperation and trust distribution in
blockchain have been widely studied in recent years. However, among these researches …

ChainKeeper: A cross‐chain scheme for governing the chain by chain

Y Xu, R He, S Dai, Y Zhang - IET Blockchain, 2023 - Wiley Online Library
With the rapid application of consortium chains, supervising these systems has become a
challenge for governments. The centralized model fails to deliver supervision services that …

Accountable Multi-Signatures with Constant Size Public Keys

D Boneh, A Partap, B Waters - Cryptology ePrint Archive, 2023 - eprint.iacr.org
A multisignature scheme is used to aggregate signatures by multiple parties on a common
message $ m $ into a single short signature on $ m $. Multisignatures are used widely in …

How to use your brain for cryptography without trustworthy machines

W Ogata, T Tomita, K Takahashi… - Cryptology ePrint …, 2025 - eprint.iacr.org
In this work, we study cryptosystems that can be executed securely without fully trusting all
machines, but only trusting the user's brain. This paper focuses on signature scheme. We …