透過您的圖書館登入
IP:52.14.126.74

並列摘要


In this paper, we survey all related threshold signature schemes and classify them with different properties. In order to compare them with different properties, we image there is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes. Based on this ideal threshold signature, readers can easily to understand what the next generation of threshold signature schemes is and attempt to propose it.

被引用紀錄


Zhang, Y. X. (2006). 網路服務安全之操作模型及其語言設計 [master's thesis, National Taiwan Normal University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0021-0712200716095945
Chang, T. K. (2006). XML文件安全塑模之設計與實作 [doctoral dissertation, National Taiwan Normal University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0021-2304200713405700

延伸閱讀