Research Article
A Rational Threshold Signature Model and Protocol Based on Different Permissions
Table 1
Several models comparison.
| Model | Verifiable | Bit Commitment | Resists conspiracy attack | Forward security | Permission | Convergence time | Range of parameters |
|
Halpern and Teague | No | No | No | No | Different | | |
| Gordon and Katz | No | No | No | No | Different | | |
| Computable complete and perfect information dynamic game | Yes | Yes | Yes | Yes | Different | | |
|
|