Knowledge Network Node
(Type-setting Accomplished Version) Online First Publishing Date: 2025-01-02 14:48:37

Weighted Threshold SM2 Signature SchemeChinese Full Text

TANG Chang-Hong;ZHAO Yan-Qi;YANG Xiao-Yi;FENG Qi;YU Yong;

Abstract: As the Internet of Things and mobile Internet technologies continue to advance, a wide range of mobile devices are connected to the Internet. To identify and authenticate these devices, it is necessary to verify the digital signatures they submit. However, many mobile devices have limited computing power and typically use software modules to store keys locally or on smart chips, which increases the risk of key exposure. To avoid this risk, threshold signatures are commonly employed in real-world... More
  • DOI:

    10.13328/j.cnki.jos.007255

  • Series:

    (I) Electronic Technology & Information Science

  • Subject:

    Telecom Technology

  • Classification Code:

    TN918.91

CNKI exclusive online-first articles is prohibited to reprint and excerpt without permission.

Download the mobile appuse the app to scan this coderead the article.

Tips: Please download CAJViewer to view CAJ format full text.

Download: 141 Pagecount: 13 Size: 799K

Related Literature
  • Similar Article
  • Reader Recommendation
  • Associated Author