Back to Results
First PageMeta Content
Key management / Deniable authentication / Ring signature / Digital signature / Authenticated encryption / Zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Public-key cryptography


Microsoft Word - DA standarden.doc
Add to Reading List

Document Date: 2011-12-20 21:30:21


Open Document

File Size: 140,93 KB

Share Result on Facebook

/

Facility

Ke Dai Information Engineering College of Yangzhou University No.196 West HuaYang Road / /

IndustryTerm

authenticated key exchange protocols / electronic voting systems / deniable authentication protocols / computing / simulation algorithm / prover algorithm / authentication protocols / above-mentioned deniable authentication protocols / deniable authentication protocol / multiplicative cyclic / /

Organization

Ke Dai Information Engineering College of Yangzhou University No.196 West HuaYang Road / /

Person

Rabin / Bin Wang / Qing Zhao / /

Position

standard model / /

Technology

encryption / simulation algorithm / cryptography / Diffie-Hellman key exchange protocol / secure symmetric encryption / Dom / randomized algorithm / secret key / deniable authentication protocol / Deniable authentication protocols / authenticated symmetric encryption / public key / following algorithms / Authenticated encryption / above-mentioned deniable authentication protocols / authenticated key exchange protocols / prover algorithm / /

SocialTag