搜索结果: 1-9 共查到“军队指挥学 Undeniable Signature”相关记录9条 . 查询时间(0.031 秒)
New Constructions of Convertible Undeniable Signature Schemes without Random Oracles
convertible undeniable signature standard model signature scheme
2009/11/18
In Undeniable Signature, a signature’s validity can only be confirmed or disavowed with the
help of an alleged signer via a confirmation or disavowal protocol. A Convertible undeniable
signature fur...
A Note on a Convertible Undeniable Signature Scheme with Delegatable Verification
undeniable signatures universal/selective convertibility provable security
2009/9/27
Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the
verifiability of his sign...
A Note on a Convertible Undeniable Signature Scheme with Delegatable Verification
undeniable signatures universal/selective convertibility provable security
2009/9/22
Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the
verifiability of his sign...
New DLOG-Based Convertible Undeniable Signature Schemes in the Standard Model
Undeniable signature selective/all conversion discrete logarithm
2009/8/18
We propose discrete-logarithm-based undeniable signature schemes supporting both
We propose discrete-logarithm-based undeniable signature schemes supporting both
selective and all conversion, with f...
Universally Composable Undeniable Signature
Universal composability undeniable signature scheme
2009/6/3
How to define the security of undeniable signature schemes
is a challenging task. This paper presents two security definitions of undeniable
signature schemes which are more useful or natural than t...
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes
digital signatures undeniable signatures group-oriented undeniable signatures
2009/4/15
Undeniable signature is an intriguing concept introduced by
Chaum and Antwerpen at Crypto’89. In 1999, Lee and Hwang presented
two group-oriented undeniable signature schemes with a trusted center.
...
A Secure Modified ID-based Undeniable Signature Scheme
undeniable signatures identity-based signatures convertible undeniable signature
2009/4/10
Han et al. proposed the first identity-based undeniable signature scheme at the fourth ACMconference
on electronic commerce. Zhang et al. showed two attacks (the denial attack and the forge attack) a...
Attack on Han et al:’s ID-based Confirmer(Undeniable)Signature at ACM-EC’03
Confirmer signature Undeniable signature Attack Bilinear pairings
2009/4/9
At the fourth ACM conference on electronic commerce (EC’03),
S. Han, K.Y. Yeung and J. Wang proposed an ID-based confirmer signature
scheme using pairings (actually, this is an ID-based undeniable
...
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
Undeniable signature security analysis
2009/4/1
In this paper, we first introduce a new kind of adversarial
goal called forge-and-impersonate in undeniable signature schemes. Note
that forgeability does not necessarily imply impersonation ability...