🤖 AI Summary
Threshold signature schemes (TSS) lack a systematic, quantitative evaluation framework, hindering informed protocol selection in practice. Method: We propose the first multidimensional evaluation methodology jointly assessing security and performance—formalizing security assumptions, conducting cross-protocol benchmarking, and performing empirical comparative experiments across mainstream TSS protocols (e.g., Gennaro–Goldfeder). Our framework uniformly quantifies core metrics including security assumption strength, communication overhead, and signature latency. Contribution/Results: We identify three fundamental structural trade-offs between security and efficiency across TSS variants, enabling the construction of a selection guideline tailored to high-concurrency blockchain environments. Empirical validation demonstrates <3% prediction error. The methodology yields verifiable, reproducible decision support for deploying TSS protocols in digital asset protection systems.
📝 Abstract
Threshold Signature Scheme (TSS) protocols have gained significant attention over the past ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder's TSS protocol. Since then, various TSS protocols have been introduced with different features, such as security and performance, etc. Large organizations are using TSS protocols to protect many digital assets, such as cryptocurrency. However, the adoption of these TSS protocols requires an understanding of state-of-the-art research in threshold signing. This study describes the holistic view of TSS protocols, evaluates cutting-edge TSS protocols, highlights their characteristics, and compares them in terms of security and performance. The evaluation of these TSS protocols will help the researchers address real-world problems by considering the relevant merits of different TSS protocols.