Knowledge Network Node

A threshold SM2 signature schemeChinese Full TextEnglish Full Text (MT)

TANG Zhangying;WANG Zhiwei;School of Computer Science, Nanjing University of Posts and Telecommunications;Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications;

Abstract: Once the private key in the blockchain wallet system is lost or leaked, irreparable losses will occur to users. In order to ensure the security of private keys, scholars worldwide have proposed the threshold signature algorithm. As a multi-participant cooperative signature algorithm, the threshold signature algorithm can prevent malicious behaviors such as misappropriation or deception. It realizes power distribution and prevents a single user from abusing the power. The SM2 digital signature al... More
  • DOI:

    10.14132/j.cnki.1673-5439.2022.04.012

  • Series:

    (I) Electronic Technology & Information Science

  • Subject:

    Telecom Technology; Computer Software and Application of Computer

  • Classification Code:

    TN918.4;TP311.13

Download the mobile appuse the app to scan this coderead the article.

Tips: Please download CAJViewer to view CAJ format full text.

Download: 418 Page: 85-95 Pagecount: 11 Size: 472K

Related Literature
  • Similar Article
  • Reader Recommendation
  • Associated Author