Research Article

A Rational Threshold Signature Model and Protocol Based on Different Permissions

Table 1

Several models comparison.

ModelVerifiableBit CommitmentResists conspiracy attackForward securityPermissionConvergence timeRange of parameters

Halpern and TeagueNoNoNoNoDifferent

Gordon and KatzNoNoNoNoDifferent

Computable complete and perfect information dynamic gameYesYesYesYesDifferent