The ability to identify which party aborted an operation.

  • For example, an adversary may corrupt up to nodes in a dishonest majority based TSS which results in a signature never to be able to be produced by the participants. GG20 outlines a solution to identify the adversary (for punishment).