搜索结果: 1-3 共查到“军队指挥学 ID-based signature”相关记录3条 . 查询时间(0.093 秒)
A universal forgery of Hess’s second ID-based signature against the known-message attack
ID-based signature Elliptic curve Bilinear maps
2009/4/13
In this paper we propose a universal forgery attack of Hess’s second ID-
based signature scheme against the known-message attack.
Recently, several ID-based signature schemes based on binary maps on...
An identity (ID)-based signature scheme allows any pair of users to com-
municate securely and to verify each other's signatures without exchanging public key
certificates. We have several ID-based ...
Efficient ID-based Signature Without Trusted PKG
ID-based Signature Key Escrow Bilinear Pairing Dishonest PKG Education, Xidian University State Key Laboratory of Integrated Service Networks, Xidian University
2008/9/3
In this paper, we introduce the exact concept of ID-based
signature without trusted Private Key Generater(PKG), which solves
the key escrow problem through binding two public key with a same
identi...