4 research outputs found

    An Undetachable Threshold Digital Signature Scheme Based on Conic Curves

    No full text
    Based on analysis of security problems on malicious hosts, a special undetachable threshold digital signature scheme is proposed. This scheme uses a cryptosystem based on conic curves and achieves the most important security characteristic of protecting mobile agents against malicious hosts, i.e., undetachablility. Furthermore, this scheme solves the case where a host can force an agent to commit to a sub-optimal transaction. Computational studies show that this scheme is superior to the RSA-based undetachable threshold digital signature scheme

    An Undetachable Threshold Digital Signature Scheme Based on Conic Curves

    No full text
    Based on analysis of security problems on malicious hosts, a special undetachable threshold digital signature scheme is proposed. This scheme uses a cryptosystem based on conic curves and achieves the most important security characteristic of protecting mobile agents against malicious hosts, i.e., undetachablility. Furthermore, this scheme solves the case where a host can force an agent to commit to a sub-optimal transaction. Computational studies show that this scheme is superior to the RSA-based undetachable threshold digital signature scheme
    corecore