搜索结果: 1-4 共查到“计算机软件 signature”相关记录4条 . 查询时间(0.078 秒)
We present a new class of signature schemes based on properties of certain bilinear algebraic maps. These signatures are secure against existential forgery under a chosen message attack in the standar...
Exchange of digitally signed certificates is often used to establish mutual trust between strangers that wish to share resources or to conduct business transactions. Automated Trust Negotiation (ATN) ...
Signing a Linear Subspace: Signature Schemes for Network Coding
Network Coding Signature Schemes
2015/8/5
Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, network coding requires i...
Identity-Based Parallel Key-Insulated Signature: Framework and Construction
Parallel Key-Insulated Identity-Based Signature Key-Exposure Bilinear Pairings
2014/3/11
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key...