摘要: The traditional threshold signature does not take time to sign the trust veriifcation of the nodes , and traditional signature strategy has defects in the respects of against internal attacks and external attacks and collusion attacks deifciencies , this