How Does a Threshold Signature Scheme Prevent a Malicious Node from Submitting False Data?

A malicious node cannot submit false data because it cannot generate a valid threshold signature on its own. It needs the cooperation of T-1 other honest nodes to reach the required threshold.

Since the honest nodes will not sign a false price, the malicious node's attempt to submit corrupted data will fail the on-chain signature verification check, preventing the false data from being accepted.

What Is a ‘Threshold Signature Scheme’ and How Is It Related to MPC?
How Does a BFT-based Consensus Mechanism Prevent a Malicious Node from Disrupting the Network?
What Cryptographic Algorithm Is Commonly Used for Implementing a Threshold Signature Scheme?
What Is the “Threshold” in a Threshold Signature Scheme (TSS) Based on MPC?
What Is “Slashing” and When Is It Executed in a Staking Protocol?
What Is the Difference between a ‘Valid Share’ and an ‘Invalid Share’?
What Are the Two Distinct Phases of a Commit-Reveal Scheme?
What Is the Significance of a “Threshold Signature Scheme” in a DON?

Glossar