搜索结果: 1-2 共查到“军队指挥学 non-interactive anonymous credentials”相关记录2条 . 查询时间(0.093 秒)
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
Proxy signatures anonymous credentials cryptographic protocols
2016/1/23
Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. The proxy is then able to produce valid signatures only for messages from this deleg...
Non-Interactive Anonymous Credentials
Non-Interactive Anonymous Credentials interactive protocol signature scheme
2008/5/26
In this paper, we introduce P-signatures. A P-signature scheme consists of a signature scheme, a commitment scheme, and (1) an interactive protocol for obtaining a signature on a committed value; (2) ...