| Document Date: 2003-11-17 03:10:04 Open Document File Size: 98,39 KBShare Result on Facebook
City an ID / / Company Yumin Wang Key Laboratory / G2 / G1 / Ge / / Facility Yumin Wang Key Laboratory of Computer Networks / / IndustryTerm forged-signature denial protocol / non-interactive protocols / cyclic multiplicative / probabilistic algorithm / polynomial time algorithm / computable algorithms / cyclic additive / deterministic algorithm / e-commerce situations / / Organization Trusted Authorities / / Person David Chaum / T. Rabin / H. Krawczyk / Hans Van Antwerpen / / Position editor / judge / / Product Franklin / / ProgrammingLanguage R / / Technology cryptography / randomized algorithm / Forge algorithm / public key / polynomial time algorithm / non-interactive protocols / hierarchical identity-based encryption / deterministic algorithm / Identity-based encryption / private key / efficiently computable algorithms / secret key / digital signature / forged-signature denial protocol / 0/1-valued algorithm / probabilistic algorithm / /
SocialTag |