搜索结果: 1-14 共查到“计算机科学技术 signature”相关记录14条 . 查询时间(0.171 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Signature-based standard basis algorithm under the framework of GVW algorithm
GVW算法框架 基于签名 标准基算法
2023/11/29
We present a new class of signature schemes based on properties of certain bilinear algebraic maps. These signatures are secure against existential forgery under a chosen message attack in the standar...
Exchange of digitally signed certificates is often used to establish mutual trust between strangers that wish to share resources or to conduct business transactions. Automated Trust Negotiation (ATN) ...
Signing a Linear Subspace: Signature Schemes for Network Coding
Network Coding Signature Schemes
2015/8/5
Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, network coding requires i...
A Survey of Two Signature Aggregation Techniques
Signature Aggregation Techniques signature scheme
2015/8/5
We survey two recent signature constructions that support signature aggregation: Given n signatures on n distinct messages from n distinct users, it is possible to aggregate all these signatures into ...
Improvement of Chen-Zhang-Liu’s IRPB Signature Scheme
Cryptography, Bilinear Pairings Restrictiveness Partially Blind Signature ID-Based Restrictive Partially Blind Signature
2013/1/29
Restrictive partially blind signatures incorporate the advantages of restrictive blind signatures and partially blind signatures, which play an important role in electronic commerce. Recently, Chen-Zh...
A Collusion-Resistant Distributed Agent-Based Signature Delegation (CDASD) Protocol for E-Commerce Applications
Agent-Based Signature Delegation Anonymous Digital Signature Signature Fairness Collusion-Resistant Signature
2013/1/28
Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is ex...
This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is pr...
Offline Signature Verification Using Graph Matching
Offline Signature Verification Graph Matching Thinning Normalization
2009/7/28
In this paper, we present a simple and effective signature verification method that depends only on the raw binary pixel intensities and avoids using complex sets of features. The method looks at the ...
Improving the Security and Flexibility of One-Time Passwords by Signature Chains
authentication hash chain signature chain
2009/7/28
While the classical attack of ``monitor the network and intercept the password'' can be avoided by advanced protocols like SSH, one-time passwords are still considered a viable alternative or a supple...
AbstractThis paper introduces a natural paradigm for fair exchange protocols, called ID-based partial proxy signature scheme. A security model with precise and formal definitions is presented, and an ...
AbstractThis paper studies the Verifiable Signature Sharing (V(S) introduced by Franklin and Reiter, which enables the recipient of a signature to share it among n proxies so that a subset of them can...
Identity-Based Parallel Key-Insulated Signature: Framework and Construction
Parallel Key-Insulated Identity-Based Signature Key-Exposure Bilinear Pairings
2014/3/11
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key...
Polarimetric Signature from Natural and Artificial Randomly Distributes Targets
Polarimetric Signature Natural and Artificial Randomly Distributes Targets
2014/4/16
Polarimetric Signature from Natural and Artificial Randomly Distributes Targets。