Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Dual invisible signature scheme

In the following, these properties are taken for granted hence the name dual invisible signature scheme is restricted to schemes with these properties. [Pg.131]

The structure of authentication and disputes in existing dual invisible signature schemes resembles that of existing invisible signature schemes with ordinary security, not that of fail-stop signature schemes. The protocol carried out during authentication is of the following restricted form ... [Pg.131]

Invisible Signature Schemes with Dual Security... [Pg.131]

As mentioned in Section 6.1.4, the usual method to obtain a non-invisible signature scheme with dual security is to use a fail-stop signature scheme and to identify broken with FALSE. The properties of the only other existing scheme of this type were sketched there, too. [Pg.146]


See other pages where Dual invisible signature scheme is mentioned: [Pg.132]    [Pg.145]    [Pg.242]    [Pg.247]    [Pg.132]    [Pg.145]    [Pg.242]    [Pg.247]    [Pg.132]   
See also in sourсe #XX -- [ Pg.131 ]




SEARCH



Invisible Signature Schemes with Dual Security

Invisible signature

Signature

Signature scheme

© 2024 chempedia.info