In this paper, we survey all related threshold signature schemes and classify them with different properties. In order to compare them with different properties, we image there is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes. Based on this ideal threshold signature, readers can eas-ily to understand what the next generation of threshold signature schemes is and attempt to propose it.
|Number of pages||15|
|Journal||International Journal of Network Security|
|Publication status||Published - 2005 Dec 1|
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications