In theory, it is always possible to construct a functioninterchangeable lattice-based threshold signature scheme if the

signing key is shared among multiple parties and the signing

algorithm is evaluated by a dishonest majority maliciously

secure MPC. Note that the security of the MPC protocol guarantees that the malicious parties will not learn the information

about the signing key shares from honest parties. However, this

method requires careful consideration of the MPC protocol’s

efficiency and security. In particular, a generic MPC like

SPDZ [28], [29] may not be efficient enough to handle the

non-linear procedures involved in the signing algorithm, such

as hash operations and rejection sampling. Additionally, since

the secret is shared among n parties, the MPC protocol should

guarantee that the computation can be carried out even if only

t parties are invoked.