作者: Giuseppe Ateniese , Daniele Venturi , Bernardo Magri
DOI:
关键词: Computer security 、 Digital signature 、 Signature (logic) 、 Identification (information) 、 Symmetric-key algorithm 、 Key (cryptography) 、 Theoretical computer science 、 Cryptography 、 Ring signature 、 Stateful firewall 、 Mathematics
摘要: … The firewall we design allows us to successfully protect so-… signature schemes (which include unique signatures as a … signatures can be extracted efficiently from the signature itself; as …