| Document Date: 2006-05-20 02:15:48 Open Document File Size: 295,86 KBShare Result on Facebook
Country United States / / / Facility University of Connecticut / / Holiday Assumption / / IndustryTerm blind signing protocol / generation algorithm / probabilistic secure function evaluation protocol / Σ-protocol / verification algorithm / probabilistic polynomial time key-generation algorithm / moves protocol / side Σ-protocol / deterministic polynomial time algorithm / signer side Σ-protocol / Σ-protocols / secure function evaluation protocol / multi-threaded signer server / basic protocol / blind signature protocol / commitment algorithm / signature generation protocol / digital signature algorithm / e-voting / e-cash systems / blind signature generation protocol / e-cash / user side Σ-protocol / / Organization National Science Foundation / University of Connecticut / / Person Canetti / Hong-Sheng Zhou† Abstract / / Position player / CRS model / / ProvinceOrState Kansas / st / UL / Connecticut / / Technology randomized encryption / side Σ-protocol / secure function evaluation protocol / PKI / 7 4.2 Signing Protocol / Paillier encryption / homomorphic encryption / signing protocol / secret key / probabilistic polynomial time key-generation algorithm / commitment algorithm / PPT algorithms / probabilistic secure function evaluation protocol / Linear encryption / ElGamal encryption / two algorithms / deterministic polynomial time algorithm / blind signature protocol / Encryption / 4-move protocols / key generation algorithm / public key / public-key encryption / 3-move protocol / underlying encryption / basic protocol / 3-move Σ-protocol / verification algorithm / two Σ-protocols / two encryptions / digital signature / two moves protocol / blind signing protocol / user side Σ-protocol / blind signature generation protocol / signer side Σ-protocol / digital signature algorithm / interactive protocol / /
SocialTag |