In this paper, we survey all related threshold signature schemes and classify them with different properties. In order to compare them with different properties, we image there is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes. Based on this ideal threshold signature, readers can eas-ily to understand what the next generation of threshold signature schemes is and attempt to propose it.
|頁（從 - 到）||123-137|
|期刊||International Journal of Network Security|
|出版狀態||Published - 2005 十二月 1|
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications