A threshold SM2 signature schemeChinese Full TextEnglish Full Text (MT)
TANG Zhangying;WANG Zhiwei;School of Computer Science, Nanjing University of Posts and Telecommunications;Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications;
Abstract: Once the private key in the blockchain wallet system is lost or leaked, irreparable losses will occur to users. In order to ensure the security of private keys, scholars worldwide have proposed the threshold signature algorithm. As a multi-participant cooperative signature algorithm, the threshold signature algorithm can prevent malicious behaviors such as misappropriation or deception. It realizes power distribution and prevents a single user from abusing the power. The SM2 digital signature al... More
- DOI:
10.14132/j.cnki.1673-5439.2022.04.012
- Series:
(I) Electronic Technology & Information Science
- Subject:
Telecom Technology; Computer Software and Application of Computer
- Classification Code:
TN918.4;TP311.13
- Mobile Reading
Read on your phone instantly
Step 1
Scan QR Codes
"Mobile CNKI-CNKI Express" App
Step 2
Open“CNKI Express”
and click the scan icon in the upper left corner of the homepage.
Step 3
Scan QR Codes
Read this article on your phone.
- Download
- Online Reading
- BETABETAEnglish HTML (MT)
- AI Summary

Download the mobile appuse the app to scan this coderead the article.
Tips: Please download CAJViewer to view CAJ format full text.
Download: 418 Page: 85-95 Pagecount: 11 Size: 472K
Citation Network
Related Literature
- Similar Article
- Reader Recommendation
- Associated Author
- [1]加权门限SM2签名方案[J]. 唐长虹,赵艳琦,杨晓艺,冯琦,禹勇. 软件学报.
- [2]面向电子投票的SM2门限环签名方案[J]. 张应辉,封舒钰,曹进,郑晓坤. 南京邮电大学学报(自然科学版).
- [3]基于SM2的周期性可否认环签名方案[J]. 张艳硕,袁煜淇,李丽秋,杨亚涛,秦晓宏. 信息网络安全. 2024(04)
- [4]移动互联网环境下轻量级SM2两方协同签名[J]. 冯琦,何德彪,罗敏,李莉. 计算机研究与发展. 2020(10)
- [5]基于SM2的可截取签名方案[J]. 任莹莹,胡江红,李妮,武特景. 河南科学. 2024(02)
- [6]基于SM2的双方共同签名协议及其应用[J]. 苏吟雪,田海博. 计算机学报. 2020(04)
- [7]基于SM2的云端双方协同签名方案设计与应用[J]. 许盛伟,邓烨,田宇. 北京电子科技学院学报. 2023(01)
- [8]基于SM2可链接环签名的联盟链隐私保护方法[J]. 高改梅,杜苗莲,刘春霞,杨玉丽,党伟超,邸国霞. 计算机应用.
- [9]基于SM2的无证书环签名方案[J]. 汪玉,郑明辉,杨景奕,黄世成. 计算机应用.
- [10]基于SM2数字签名算法的环签名方案[J]. 范青,何德彪,罗敏,黄欣沂,李大为. 密码学报. 2021(04)