• 沒有找到結果。

An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities

N/A
N/A
Protected

Academic year: 2022

Share "An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities

作者: Chang, Y. F.;Chang, C. C.

關鍵詞: cryptography;information security;computer security;proxy

signature;RSA cryptosystems;(t, n) threshold;freewill identities;private key;identity choice

日期: 2007-01

上傳時間: 2009-12-17T06:58:09Z 出版者: Asia University

摘要: Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on the RSA cryptosystem. Later, Wang et al. (2004a) indicated that this scheme was insecure because the original signer's private key could be derived. Moreover, the delegates' identities had to be chosen carefully. In this paper, we propose an improved RSA- based (t, n) threshold proxy signature scheme, which withstands this

(2)

security flaw and also offers the convenience of choosing identities at will.

參考文獻

相關文件

Reinforcement learning is based on reward hypothesis A reward r t is a scalar feedback signal. ◦ Indicates how well agent is doing at

Improve macro-average F-measure: 0.333 → 0.511 Five-fold cross validation for better thresholds Threshold T j = average of five thresholds. Tuning threshold significantly

Unlike the case of optimizing the micro-average F-measure, where cyclic optimization does not help, here the exact match ratio is slightly improved for most data sets.. 5.5

In this thesis, we have proposed a new and simple feedforward sampling time offset (STO) estimation scheme for an OFDM-based IEEE 802.11a WLAN that uses an interpolator to recover

Furthermore, based on the temperature calculation in the proposed 3D block-level thermal model and the final region, an iterative approach is proposed to reduce

A decision scheme based on OWA operator for an evaluation programme: an approximate reasoning approach. A decision scheme based on OWA operator for an evaluation programme:

The GCA scheduling algorithm employs task prioritizing technique based on CA algorithm and introduces a new processor selection scheme by considering heterogeneous communication

Abstract: This paper presents a meta-heuristic, which is based on the Threshold Accepting combined with modified Nearest Neighbor and Exchange procedures, to solve the Vehicle