It is a verifiable scheme, and the size of the scheme doesn"t increase with signer number. The scheme could resist all kinds of collusion, which makes it more practicable and safer."
方案具有可验证性.且签名的长度不随签名者的人数线性增长,并能抵抗各种内部合谋攻击,具有更高的实用性和安全性。
Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.
对张劼等人提出的一类可验证的门限签名方案进行了安全性分析,发现它存在安全漏洞,容易受到合谋攻击和伪造攻击,并且不具备不可否认性。
This paper presents a new verifiable threshold blind signature scheme based on the elliptic curve by adopting threshold cryptography and blind signature scheme.
结合椭圆曲线密码体制、门限密码技术和盲签名方案,该文提出了一种基于椭圆曲线可验证的门限盲签名方案。
Making use of the good properties of cryptography Hash functions and the difficulties of DLP, a verifiable and linkable ring signature scheme is constructed.
利用密码哈希函数的良好性质和DLP的困难性问题,构造了一个可验证可关联的环签名方案。
Also, the scheme is extended to the context of multi-recipient ElGamal encryption and an efficient publicly verifiable RSA scheme is proposed.
同时将该方案推广到了多个接受者的情形,最后给出了高效的可公开验证rsa加密方案。
Through the security analysis, the scheme satisfies the following properties:Existential unforgeable, signer ambiguous, linkable and verifiable.
通过安全分析,该方案满足存在不可伪造性、签名者匿名性、可关联性、可验证性等特点。
This paper proposes a certificateless verifiable ring signature scheme. It is based on the concepts of certificateless cryptosystem and verifiable ring signature scheme.
将无证书的密码体制与可验证环签名相结合,提出一个无证书的可验证环签名方案。
This paper proposes an ownership proofs scheme for digital works based on proactive verifiable secret sharing and secure multiparty computation.
本文采用现实的多方安全计算模式,结合数据干扰技术,提出了一种保持隐私的异常检测算法。
It is important to construct fair exchange scheme, publicly verifiable secret sharing and cheater-resistant secure multi-party computation.
这在公平交换、防欺骗的秘密分享和安全多方计算中有重要应用。
It is important to construct fair exchange scheme, publicly verifiable secret sharing and cheater-resistant secure multi-party computation.
这在公平交换、防欺骗的秘密分享和安全多方计算中有重要应用。
应用推荐