Threshold Signature Schemes Application
This work is devoted to an investigation of threshold signature schemes.The systematization of the threshold signature schemes here was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined.Different methods of generation and verification of threshold signatures blackmores