A Rational Threshold Signature Model and Protocol Based on Different Permissions
This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret...
Saved in:
| Main Authors: | Bojun Wang, Cheng Cai, Quan Zhou |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2014-01-01
|
| Series: | Journal of Applied Mathematics |
| Online Access: | http://dx.doi.org/10.1155/2014/176085 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Explanation and Distinction of the Legal Nature of Permission as a Basis for Permissibility and Permission as a Basis for Agency (Permission as the Source of Permissibility and Permission as the Source of Agency)
by: Alireza Abbasi, et al.
Published: (2024-08-01) -
Analysis and construction for threshold signature scheme based on game theory
by: ANGJie W, et al.
Published: (2015-05-01) -
Anonymous Cluster-Based MANETs with Threshold Signature
by: YoHan Park, et al.
Published: (2013-03-01) -
Deletable blockchain based on threshold ring signature
by: Yanli REN, et al.
Published: (2019-04-01) -
Permissive-elimination diet
by: A. S. Prilutskiy
Published: (2023-07-01)