• 劼等提出的一类验证的门限签名方案进行了安全性分析,发现存在安全漏洞,容易受到合谋攻击伪造攻击,并且具备不否认性。

    Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.

    youdao

  • 结合椭圆曲线密码体制、门限密码技术和签名方案该文提出了种基于椭圆曲线验证的门限盲签名方案

    This paper presents a new verifiable threshold blind signature scheme based on the elliptic curve by adopting threshold cryptography and blind signature scheme.

    youdao

  • 结合椭圆曲线密码体制、门限密码技术签名方案该文提出了一种基于椭圆曲线验证的门限签名方案

    This paper proposes a threshold multi-proxy blind multi-signature scheme based on elliptic curve by adopting threshold cryptography and blind signature scheme.

    youdao

  • 结合椭圆曲线密码体制、门限密码技术签名方案该文提出了一种基于椭圆曲线验证的门限签名方案

    This paper proposes a threshold multi-proxy blind multi-signature scheme based on elliptic curve by adopting threshold cryptography and blind signature scheme.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定