This paper introduces the conception, principle, component, and providing kernel service of PKI and CA, explains conception, application area, class and implement method and threshold cryptography system of intrusion tolerance technology. It designs a threshold XTR intrusion tolerance signature scheme, which based on shamir (t, n) threshold secret scheme and XTR public key cryptography system, introduces intrusion tolerance characteristic and research classification in respect to application and development of this scheme. Then it describes the system structure model, nuclear processing module and the method of private key intrusion conservancy of this threshold XTR intrusion tolerance certificate authority scheme. Lastly, the paper analyses the affection of different (t, n) threshold of the security in this system, and compares XTR with ECC and RSA by experiment. |