Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Presentation

A Deep Dive Into the Threshold BLS Signature Scheme

September 18, 2025

Presenters

Sourav Das - University of Illinois Urbana-Champaign; Category Labs

Description

Abstract. Threshold signature schemes protect the signing key by sharing it among a group of signers so that an adversary must corrupt a threshold number of signers to be able to forge signatures. The increasing demand for decentralized applications has resulted in large-scale adoption of threshold signature schemes. A popular choice of threshold signature is the BLS signature, introduced by Boldyreva building on the work of Boneh–Lynn–Shacham [BLS01]. Boldyreva’s BLS threshold signature scheme is popular because its verification is identical to a standard non-threshold BLS signature, its signing process is non-interactive, the signatures are unique and small (a single elliptic curve group element), and the scheme is very efficient in terms of both computation and communication. These properties have resulted in practical adoptions of Boldyreva’s BLS threshold signature for applications in the decentralized setting. In this talk, I will take a deep dive into the design and implementation of Boldyreva’s Threshold BLS signature scheme. Specifically, I will talk about Shamir's secret sharing scheme, the original BLS signature scheme, and how we can thresholdize it. Finally, I will also provide a walk-through a prototype implementation of the scheme.

Based on work performed while at UIUC.

Suggested readings: 

[Slides]

Slide-deck cover: A deep dive in Threshold BLS Signature Scheme

Presented at

STPPA #8: Special Topics on Privacy and Public Auditability, Event 8

Downloads

Event Details

Location

    
                                

Related Topics

Security and Privacy: cryptography

Created September 02, 2025, Updated September 23, 2025