« Home « Kết quả tìm kiếm

Digital Signature


Tìm thấy 20+ kết quả cho từ khóa "Digital Signature"

Constructing digital signature algorithms based on new key schemes

tailieu.vn

A new method for constructing digital signature schemes base on difficulty of the integer factorization and discrete logarithm root problems the zn. A new construction method of digital signature algorithms. A new digital signature scheme based on the hardness of some expanded root problems.. Constructing a digital signature algorithm based on the difficulty of some expanded root problems. Developing root problem aims to create a secure digital signature scheme in data transfer

A new construction method of digital signature algorithms

tailieu.vn

A New Construction Method o f Digital Signature Algorithms. The article presents a new construction method of digital signature algorithms based on difficulty of the discrete logarithm problem. Digital signature. Digital signature algorithm. Discrete logarithm problem.. In this article, the authors propose a new construction method of signature schemes based on difficulty of the discrete logarithm problem in the field of finite elements..

A design method of digital signature scheme based on discrete logarithm problem

tailieu.vn

A Design Method o f Digital Signature Scheme Based on Discrete Logarithm Problem. This paper proposes a design method of digital signature scheme based on the difficulty of the discrete logarithm problem. With the proposed method, we can develop a lot of other digital signature schemes to choose suitable for practical applications.. Digital signature. Digital signature algorithm. Discrete logarithm problem..

A new method for constructing digital signature algorithm based on a new key scheme

tailieu.vn

The following section will present a method of constructing digital signature algorithm based on a new key scheme.. Constructing digital signature algorithm based on a new key scheme. A digital signature scheme consists of three main algorithms: Key Generation Algorithm, Signing Algorithm and Signature Verifying Algorithm. The method of constructing digital signature scheme will be presented immediately following:.

A new digital signature scheme based on the hardness of some expanded root problems

tailieu.vn

This proposed scheme enable to build a high-security digital signature platform for practical applications.. Keywords: Digital Signature. Digital Signature Scheme. Root Problem. Discrete Logarithm Problem.. The approach of improving the safety of digital signature algorithms based on the difficulty of solving simultane- ously two difficult problems has attracted much attention from researchers.

Constructing a digital signature algorithm based on the difficulty of some expanded root problems

tailieu.vn

This proposed method enable to build a high-security digital signature platform for practical applications.. Index Terms—Digital signature, Digital signature algorithm, Digital signature scheme, Root problem. However, the research and development of new digital signature schemes improving the performance and safety of the algorithm for the purpose of designing protective products, devices as well as guaranteeing domestic information security has always been a necessary issue.

Using Digital Signatures

tailieu.vn

Selecting the Digital Signature or Encrypted Message button on the message opens a dialog like the one shown in Figure 8.13.. Figure 8.13. The Digital Signature: Valid dialog. Click the Details button to learn more about the certificate.. A digital signature isn't absolute proof that the person is who he says he is. Anyone can make up a name and get a digital signature..

[ Team LiB ] Using Digital Signatures

tailieu.vn

Selecting the Digital Signature or Encrypted Message button on the message opens a dialog like the one shown in Figure 8.13.. Figure 8.13. The Digital Signature: Valid dialog. Click the Details button to learn more about the certificate.. A digital signature isn't absolute proof that the person is who he says he is. Anyone can make up a name and get a digital signature..

Developing root problem aims to create a secure digital signaturescheme in data transfer

tailieu.vn

This proposed method enable to build a high-security digital signature platform for practical applications.. Index Terms—Digital signature, Digital signature scheme, Root problem, Expanded root problem.. However, the research and development of new digital signature schemes improving the performance and safety of the algorithm for the purpose of designing protective products, devices as well as guaranteeing domestic information security has always been a necessary issue.

Blind signature scheme based on discrete logarithm problem

tailieu.vn

BLIND SIGNATURE SCHEME BASED ON DISCRETE LOGARITHM PROBLEM. Abstract: This paper introduced the new blind signature scheme inspired from Schnorr signature scheme. The proposed signature scheme is proved to be more security than previous researches in this field by hiding the original author of a message.. Keywords: Digital Signature, Blind Signature, Digital Signature Scheme.. The blind signature scheme was introduced by D.

Post - quantum blind signature protocol on non commutative algebras

tailieu.vn

The proof of correctness of the blind digital signature protocol V. Z ε and the first element of the authentic signature e = F h (M, V. By the value of ¯ s the client calculates the second element s of the authentic signature to the document M s. in full compliance with the verification procedure of the initial signature scheme described in Section 4.2. The proof of correctness of the protocol is identical to the proof of correctness of the blind signature protocol described in Subsection 4.4..

Digital Economy: Impacts, Influences and Challenges

tailieu.vn

This intuitive approach to the digital signature process allows for extremely high confidence in the security and privacy of the encryption-decryption process, and.

Handbook of Applied Cryptography - chap11

tailieu.vn

Table 11.1: Notation for digital signature mechanisms.. 11.1 Note (comments on Table 11.1). Figure 11.1 illustrates this classification. Figure 11.1: A taxonomy of digital signature schemes.. 11.2.2 Digital signature schemes with appendix. 11.5.1), ElGamal. 11.5.2), and Schnorr. 11.5.3) signature schemes. Figure 11.2: Overview of a digital signature scheme with appendix.. 11.6 Note (use of hash functions) Most digital signature schemes with message recovery.

Xây dựng lược đồ chữ ký số dựa trên tính khó của bài toán logarit rời rạc kết hợp khai căn trên Zp

tailieu.vn

A public key cryptosystem and a signature scheme based on discrete logarithms. Digital Signature Standard, U.S. Produce and check procedures of Electronic Digital Signature based on Asymmetric Cryptographic Algorithm. Produce and check procedures of Electronic Digital Signature.

Xây dựng thuật toán chữ ký số dựa trên một dạng bài toán khó mới

tailieu.vn

Keywords: Digital signature, Digital signature algorithm, Digital Signature Schema, Discrete logarithm problem.

Innovation within Digital Rights Management

tailieu.vn

Two of the dominating REL alternatives today are called Extensible Rights Markup Language (XrML) and Open Digital Rights Language (ODRL), both of which are based on Extensible Markup Language (XML). and contains a digital signature which is an electronic signature that is used to authenticate the identity of the sender or signer of the content.

Thuật toán chữ ký số xây dựng trên bài toán logarit rời rạc kết hợp khai căn

tailieu.vn

In addition, the signature schema construction method here can be applied to develop a new digital signature algorithm layer that is suitable for applications that require high levels of security in practice.. Keywords: Digital Signature. Digital Signature Algorithm. Digital Signature Schema

Design and Implementation of a Digital Certificate Issuing System

www.scribd.com

Bất cứ một sự thay đổi nhỏ nào của dữ liệu vào đều dẫn đến kết quả khác •Không thể khôi phục lại dữ liệu nguyên bản từ giá trị sau khi Hash 17Vấn đề và giải pháp: Phát hiện thay đổiTT CHỮ KÝ ĐIỆN TỬ• Thực hiện ký điện tử cho một tài liệu  Thực hiện HASH nội dung tài liệu -MD5, SHA  Dùng khoá Private mã hoá kết quả sau khi HASH• Thông tin sau khi được mã hoá được gọi là chữ ký điện tử (digital signature) 18 Vấn đề và giải pháp: Phát hiện thay đổi TT ỨNG DỤNG CHỮ KÝ ĐIỆN TỬQuá trình kiểm tra qua

Ứng dụng xác thực hai yếu tố và chữ ký điện tử vào hoạt động ngân hàng

105627-TT-EN.pdf

dlib.hust.edu.vn

Composed of preface, 5 chapters of content, and conclusion, the thesis studies general theories of user authencation, methods to integrate authentication factors, the components and operation model of PKI, and digital signature application based on PKI infrastructure.

Hacker Professional part 194

tailieu.vn

NIST has stated that its proposed Digital Signature Standard (see Question 6.8) should be capable of ``proving to a third party that data was actually signed by the. generator of the signature. this implies that the government will support the legal authority of digital signatures in the courts.