Topos Network
Published in

Topos Network

ICE-FROST: Identifiable Cheating Entity FROST Signature Protocol

Photo by Daniele Levis Pelusi on Unsplash

The Schnorr algorithm

  • Prove that someone possessing a (secret) signing key signed a message;
  • Guarantee that the message was not tampered with between the signature creation and its verification;
  • Be verifiable by anybody possessing the (usually public) verifying key.

Threshold signatures

  1. t-1 or less shares cannot produce a valid Schnorr signature.
  2. t or more shares can produce a valid Schnorr signature.

The FROST Protocol

Static ICE-FROST

--

--

Topos is a consensusless, trust-free, privacy-enhancing interoperability protocol to bridge blockchains

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store