Performance Evaluation of Threshold Signing Schemes in Cryptography

📅 2025-03-12
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Threshold signature schemes (TSS) lack a systematic, quantitative evaluation framework, hindering informed protocol selection in practice. Method: We propose the first multidimensional evaluation methodology jointly assessing security and performance—formalizing security assumptions, conducting cross-protocol benchmarking, and performing empirical comparative experiments across mainstream TSS protocols (e.g., Gennaro–Goldfeder). Our framework uniformly quantifies core metrics including security assumption strength, communication overhead, and signature latency. Contribution/Results: We identify three fundamental structural trade-offs between security and efficiency across TSS variants, enabling the construction of a selection guideline tailored to high-concurrency blockchain environments. Empirical validation demonstrates <3% prediction error. The methodology yields verifiable, reproducible decision support for deploying TSS protocols in digital asset protection systems.

Technology Category

Application Category

📝 Abstract
Threshold Signature Scheme (TSS) protocols have gained significant attention over the past ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder's TSS protocol. Since then, various TSS protocols have been introduced with different features, such as security and performance, etc. Large organizations are using TSS protocols to protect many digital assets, such as cryptocurrency. However, the adoption of these TSS protocols requires an understanding of state-of-the-art research in threshold signing. This study describes the holistic view of TSS protocols, evaluates cutting-edge TSS protocols, highlights their characteristics, and compares them in terms of security and performance. The evaluation of these TSS protocols will help the researchers address real-world problems by considering the relevant merits of different TSS protocols.
Problem

Research questions and friction points this paper is trying to address.

Evaluates performance and security of Threshold Signature Schemes (TSS).
Compares state-of-the-art TSS protocols for cryptocurrency applications.
Provides insights for selecting TSS protocols based on real-world needs.
Innovation

Methods, ideas, or system contributions that make the work stand out.

Evaluates cutting-edge Threshold Signature Scheme protocols
Compares TSS protocols on security and performance
Provides holistic view for real-world problem solving
🔎 Similar Papers
No similar papers found.
F
Faneela
School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, United Kingdom
J
Jawad Ahmad
Cybersecurity Center, Prince Mohammad Bin Fahd University, Alkhobar, Saudi Arabia
B
B. Ghaleb
School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, United Kingdom
Imdad Ullah Khan
Imdad Ullah Khan
Department of Computer Science, LUMS
AlgorithmsGraph TheoryData AnalysisBioinformaticsSocial Networks
W
William J. Buchanan
School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, United Kingdom
Sana Ullah Jan
Sana Ullah Jan
Edinburgh Napier University
Artificial IntelligenceMachine LearningSensor Faults DiagnosiseHealthCybersecurity
Muhammad Shahbaz Khan
Muhammad Shahbaz Khan
Edinburgh Napier University
Image EncryptionApplied CryptographyPost-Quantum CryptographyQuantum Image EncryptionAI/ML