View Document Preview and Link
Document Date: 2005-09-06 11:06:02 Open Document File Size: 218,26 KB Share Result on Facebook
Company Hewlett-Packard Laboratories / / / Event Reorganization / / Facility University of London / / IndustryTerm denial protocols / setup algorithms / dishonest verifiers using algorithm / verification algorithm / polynomial time algorithm / denial protocol / denial proof systems / signature generation algorithm / proof systems / confirmation proof verification algorithm / confirmation proof generation algorithm / proof generation algorithm / denial proof generation algorithm / denial proof verification algorithm / confirmation protocol / / OperatingSystem XP / / Organization University of London / / Person Kenneth G. Paterson / / Position author / formal security model for NIDV undeniable signatures has been developed / security model for NIDV undeniable signatures ever been developed / / ProvinceOrState Saskatchewan / / Technology signature generation algorithm / proof generation algorithm / confirmation proof generation algorithm / confirmation protocol / dishonest verifiers using algorithm / L. The setup algorithms / public key / polynomial time algorithm / denial protocols / denial proof generation algorithm / KeyGen algorithms / verification algorithm / denial proof verification algorithm / confirmation proof verification algorithm / private key / following algorithms / probabilistic KeyGen algorithm / denial protocol / probabilistic Setup algorithm / / SocialTag