搜索结果: 1-3 共查到“军事学 RSA Signature”相关记录3条 . 查询时间(0.079 秒)
Fully Deniable Mutual Authentication Protocol Based on RSA Signature
Deniability RSA Signature
2014/3/6
Deniable authentication protocols allow a sender to authenticate a receiver, in a way that the receiver cannot convince a third party that such authentication (or any authentication) ever took place. ...
The Security of Practical Two-Party RSA Signature Schemes
RSA digital signatures two-party protocols proofs of security
2009/4/16
In a two-party RSA signature scheme, a client and server, each holding a share of an RSA
decryption exponent d, collaborate to compute an RSA signature under the corresponding public
key N; e known ...
The Cramer-Shoup Strong-RSA Signature Scheme Revisited
Cramer-Shoup Strong-RSA Signature Scheme
2009/4/13
We discuss a modification of the Cramer-Shoup strong-RSA
signature scheme. Our proposal also presumes the strong RSA assumption
(and a collision-intractable hash function for long messages), but
|w...