Abstract

The study presents a threshold signature scheme. While developing threshold cryptography, the concept of threshold signature can accomplish a tradeoff between efficiency in use and depe ndability of security. The presented threshold signature scheme can resist conspiracy attack by controlling the right of issuing group sign ature, and the performance of constructing group signature is also enhanced by simplifying keys.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call