This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: gqIP0WhbthhB9AlRePE4ruY6uXCmoUouKZJlFFFYhxk
Cover

Introduction to Threshold Signatures

Written by @symbialice | Published on 2022/5/28

TL;DR
A group of parties can create a digital signature in such a way that none of the parties have access to the secret needed to create the signature. Only a quorum (a part of parties) participates in signing. The signature looks always the same, and it doesn’t change whatever you sign with it. The public key is a semblance of your name in a document signed with a common signature. This information about you is publicly known. On the other hand, only you should know the private key. For authentication, one should have the public key used to have the signer’s public signature, the signed message, and the public identifier.

[story continues]


Written by
@symbialice
Symbiosis is a decentralized multi-chain liquidity protocol.

Topics and
tags
blockchain|tatum_io|blockchain-writing-contest|cryptography|public-key-cryptography|threshold-signatures|tutorial|mathematics
This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: gqIP0WhbthhB9AlRePE4ruY6uXCmoUouKZJlFFFYhxk