Microsoft Word - 系统建设1.doc 关键词: 基于身份;密钥托管;门限签密;双线性对 [gap=681]Keywords: ID-based; key escrow; threshold signcryption; bilinear pairings
基于6个网页-相关网页
threshold signcryption schemes 门限签密方案
Generalized Threshold Signcryption 广义门限签密
threshold proxy signcryption 门限代理签密
To overcome this weakness, the threshold technology was used to devise a secure ID-based signcryption scheme.
为了克服这一缺陷,本文使用门限技术设计了一个安全的身份基签密方案。
Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.
安全分析结果表明,与L - L - C - Z门限代理签密协议相比,该改进门限代理签密协议能够承受接收方公钥替换攻击。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
应用推荐