1) anonymous signature
匿名签名
2) anonymous signature
匿名性签名
1.
Based on the anonymous signature scheme of electronic wallet,as designed by D.
Chaum建立的电子钱包的匿名性签名方案的基础上,针对D。
2.
The anonymous signature of electronic wallet,is that every electronic wallet has a public key signed by the bank.
电子钱包的匿名性签名,是指每个电子钱包都有一个经过银行签名的公钥,因此可以进行有效的签名,并且对于每个合法用户,并不能从它的电子钱包的公钥推断出此电子钱包的身份(ID)。
3) Proxy signature with proxy signer privacy protection
匿名代理签名
1.
Then present research situations of proxy signature with proxy signer privacy protection,proxy blind signature and proxy signature based on elliptic curve are discussed.
首先引入了代理签名的定义、性质和分类,然后评述了匿名代理签名、代理盲签名和基于椭圆曲线代理签名的研究现状,并分别给出相应的典型代理签名方案及其所受到的攻击,最后总结出目前代理签名方案中存在的问题并做出展望。
2.
A proxy signature with proxy signer privacy protection is proposed by Fu-Kou-Xiao,which has two characteristics listed as follows:the proxy signer s identity is hidden behind an alias;the anonymity can be revoked when it is need to identify the proxy signer without a trusted third party.
Fu-Kou-Xiao提出了一种匿名代理签名方案,其特点在于:用户的真实身份隐藏在原始签名人颁发的一个假名中;匿名性撤销时不需要可信第3方的参与。
4) anonymous proxy signature
匿名代理签名
1.
Design and Analysis of Anonymous Proxy Signature Scheme;
匿名代理签名方案设计与分析
2.
A new anonymous proxy signature scheme with off-line traceability based on ElGamal cryptosystem is proposed according to the benefit of the proxy signer and the signature verifier.
综合考虑代理签名者和签名验证者的利益,基于ElGamal签名体制提出了一种具有离线可追踪性的匿名代理签名方案。
3.
Because Shum-Wei anonymous proxy signature scheme has weakness of original signers forge attack and low implementation efficiency of the construction of discrete logarithm problem,this paper proposes a new anonymous proxy signature scheme based on ECC,and analyzes the essential security characters it has.
Shum-Wei匿名代理签名方案存在原始人伪造攻击,且由于基于离散对数问题构造,实现效率不高。
6) anonymity
[英][,ænə'nɪməti] [美]['ænə'nɪmətɪ]
匿名
1.
An Efficient Anonymity Analysis Algorithm;
一种有效的匿名分析算法
2.
Influence of Anonymity on Computer Based English Writing by Empirical Analysis
匿名对以计算机为媒介的大学英语写作教学影响的实证研究
3.
Also this paper addressed an anonymity attack model for pervasive computing that it relied on the closely relationship between anonymity and unlinkability.
该协议由服务发现者对用户进行认证和盲签名,随后用户以匿名的方式访问服务提供者提供的资源。
补充资料:签名
1.写上自己的姓名。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条