Security Signature Scheme of Threshold and Blindness
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The threshold signature is popular in electronic signature. This paper presents an efficient secure threshold signature scheme on threshold, which uses bilinear paring, threshold identity, and threshold blinding signature to solve deficiency about client performance. Analysis shows that the scheme is easy to realize and the safety of system is high. The scheme can satisfy the demand of electronic signature.

    Reference
    Related
    Cited by
Get Citation

胡建军.一种安全的门限盲签名方案.计算机系统应用,2012,21(5):216-218

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:September 06,2011
  • Revised:November 14,2011
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063