透過您的圖書館登入
IP:52.14.130.13

並列摘要


In our proposed scheme, the participants are arranged in a hierarchical structure according to their position or rank and each first level participant as a parent node delegates his power to the lower level hierarchical group members. The group members help to reconstruct the secret shares of their parent nodes in their absence and the secret key is reconstructed even if at least one parent node is present. The secret shares are transmitted between the participants and the trusted dealer through our Elliptic Curve Cryptography (ECC) based signcryption scheme. The formal security analysis shows that our proposed scheme is protected from the adversaries.

延伸閱讀