نتایج جستجو برای: convertible
تعداد نتایج: 900 فیلتر نتایج به سال:
Consider (with apologies to Adam Smith) an efficient pin producer selling half her production in the convertible currency market (where buyers are picky) and the rest in the domestic market to inefficient, financially shaky (state-owned) enterprises. The pins are similar but not identical, with only good pins sold in the convertible currency market and both good and bad pins in the domestic mar...
To send the message to the recipient securely, authenticated encryption schemes were proposed. In 2008, Wu et al. [T.S. Wu, C.L. Hsu, K.Y. Tsai, H.Y. Lin, T.C. Wu, Convertible multi-authenticated encryption scheme, Information Sciences 178 (1) 256–263.] first proposed a convertible multi-authenticated encryption scheme based on discrete logarithms. However, the author finds that the computation...
In Undeniable Signature, a signature’s validity can only be confirmed or disavowed with thehelp of an alleged signer via a confirmation or disavowal protocol. A Convertible undeniablesignature further allows the signer to release some additional information which can make anundeniable signature become publicly verifiable. In this work we introduce a new kind of attacks,called cl...
A convertible authenticated encryption scheme allows the signer to create a valid authenticated ciphertext such that only the specified receiver can simultaneously recover and verify the message. To protect the receiver’s benefit of a later dispute on repudiation, the receiver has the ability to convert the signature into an ordinary one that can be verified by anyone. However, the previous pro...
generally an important part of changes in architectural constructions are represented by convertible structures. these kinds of structures are composed typically of hard or soft materials or combination of both, which avoid independent structural deformations and need additional elements such as hinges, rollers or other similar components. development of new construction materials like fiber-re...
In this paper, we propose a new approach for constructing selectively convertible undeniable signature schemes, and present two efficient schemes based on RSA. Our approach allows a more direct selective conversion than the previous schemes, and the security can be proved formally. Further, our disavowal protocols do not require parallelization techniques to reach a significant soundness probab...
In the usual presentations of simply typed-calculus, it is usual to identify terms that are-convertible. However, this is not at all a practise in most (typed) functional languages, for which simply typed-calculus is a theoretical foundation. Here, ve well known variants of the type system for simply-calculus which work with variable names are presented. Essentially, these formulations diier in...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of the sender to any third party if the sender repudiates her signature later. In this paper, after showing some weaknesses in Wu et al.’s [21] and Huang et al ’s [10] convertible authenticated encryption schemes, we propo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید