搜索结果: 1-3 共查到“军事学 Modular Protocol Design”相关记录3条 . 查询时间(0.133 秒)
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
universal composability commitments attribute tokens
2016/6/7
Complex cryptographic protocols are often designed from simple cryptographic primitives, such as signature schemes, encryption schemes, verifiable random functions, and zero-knowledge proofs, by bridg...
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
key exchange constructive cryptography
2014/3/10
Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is us...
Signing on Elements in Bilinear Groups for Modular Protocol Design
Digital Signatures Modular Protocol Design Groth-Sahai Proofs Blind Signatures Group Signatures
2010/3/16
This paper addresses the construction of signature schemes whose verification keys, messages,
and signatures are group elements and the verification predicate is a conjunction of
pairing product equ...