军事学 >>> 军事学
搜索结果: 1-7 共查到军事学 Identities相关记录7条 . 查询时间(0.109 秒)
In a traitor tracing (TT) system for nn users, every user has his/her own secret key. Content providers can encrypt messages using a public key, and each user can decrypt the ciphertext using his/her ...
A traitor tracing scheme is a multi-user public-key encryption scheme where each user in the system holds a decryption key that is associated with the user's identity. Using the public key, a content ...
We propose a decentralized multi-authority anonymous authentication scheme in which a prover and a verifier are non-interactive. We give two security definitions; resistance against collusion attacks ...
We propose a generic construction of a Σ-protocol of commit-and-prove type, which is an \textsc{and}-composition of Σ-protocols on the statements that include a common commitment. Our protocol enables...
There is a great deal of confusion in the cryptology literature relating to various identity related issues. By ``names'' (lower case), we are referring to informal, personal ways that we indicate oth...
Let Fq be a finite field, Fqs be an extension of Fq, let f(x) ∈ Fq[x] be a polynomial of degree n with gcd(n; q) = 1. We present a recursive formula for evaluating the exponential sum Σc2Fqs(s)(f(x))...
We have shown how, at a cost of about 252 calls to the MD5 compression function, for any two target messages m1 and m2, values b1 and b2 can be constructed such that the concatenated values m1kb1 an...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...