For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn’t do well in resisting internal attacks and external attacks and collusion attacks, so this paper presents a new threshold signature based on Trusted Platform Module (TPM), based on TPM the signature node first should finish the trust proof between it an other members who take part in the signature. Using a no-trusted center and the threshold of the signature policy, this strategy can track active attacks of the key management center and can prevent framing the key management center, this strategy takes into account the limited computing power TPM and has parameters of simple, beneficial full using of the limited computing power TPM.
展开▼
机译:Comments on, Xuan Li, Shanghong Zhao, Zihang Zhu, Bing Gong, Xingchun Chu, Yongjun Li, Jing Zhao and Yun Liu 'an optical millimeter-wave generation scheme based on two parallel dual-parallel Mach-Zehnder modulators and polarization multiplexing', Journal of Modern Optics, 2015
机译:An Innovative Workflow for Appropriate Selection of Subsurface-Surface Model Integration Scheme Based on Petroleum Production System Nature, User Needs,and Integrated Simulation Performance
机译:metodi microbiologici Tradizionali e metodi moleculeolari per l'analisi degli integratori alimentari a base di o con probiotici per ujso umano(microbiological and molecular methods for analysis of probiotic Based Food supplements for Human Consumption)。