To overcome this weakness, the threshold technology was used to devise a secure ID-based signcryption scheme.
为了克服这一缺陷,本文使用门限技术设计了一个安全的身份基签密方案。
Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.
安全分析结果表明,与L - L - C - Z门限代理签密协议相比,该改进门限代理签密协议能够承受接收方公钥替换攻击。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
应用推荐