- 1、本文档共9页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
an attack on the proactive rsa signature scheme in the ursa ad
An Attack on the Proactive RSA Signature Scheme in
the URSA Ad Hoc Network Access Control Protocol
Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi
School of Information and Computer Science
UC Irvine, CA 92697, USA
{stasio, nitesh, jhyi}@
ABSTRACT 1. INTRODUCTION: BACKGROUND AND
Recently, Luo, et al. in a series of papers [17, 14, 13, 18, 15] MOTIVATION
proposed a set of protocols for providing ubiquitous and ro-
bust access control [URSA] in mobile ad hoc networks with- Threshold and Proactive Signature Schemes. A (t, n)
out relying on a centralized authority. The URSA protocol threshold signature scheme [6] enables any subgroup of t + 1
relies on the new proactive RSA signature scheme, which members in a group consisting of n t members, to col-
allows members in an ad hoc group to make access control laboratively sign a message on behalf of that group. This is
decisions in a distributed manner. The proposed proactive achieved by secret-sharing the signature key, e.g. the RSA
RSA signature scheme is assumed secure as long as no more secret key, among the group members, and allowing them
than an allowed threshold of participating members is si- to compute a signature on some message via a distributed
multaneously corrupted at any point in the lifetime of the protocol in which the members use the shares of the sig-
scheme. nature key instead of the key itself. The scheme is said
您可能关注的文档
- a new strongfinancestrong capitalism mutual funds and ownership re.pdf
- a new strongfstrong-shaped xor gate and its implementations as novel adder.pdf
- a new species of snapper (perciformes lutjanidae) from.pdf
- a note on finitely generated multiplication semimodules over.pdf
- a normative strongaccountstrong of the need for explanation - csu, chico.pdf
- a note on topical strongnstrong-grams.pdf
- a novel digital relay strongmodelstrong based on simulink and its.pdf
- a organização do ensino fundamental em ciclos algumas.pdf
- a note on strongpstrong´epin’s counter examples to the hasse principle for.pdf
- a pattern-based method for building requirements documents in.pdf
最近下载
- 《系统动力学》全套教学课件(共15章完整版).pptx
- 数学必修一导学案全册:必修一导学案与练习全册.pdf VIP
- [兴安盟]2024年内蒙古兴安盟盟直事业单位引进人才35人 笔试历年典型考题及考点剖析附答案详解.doc
- 律师业务档案卷宗封面格式——司律通字(1991)153号.docx
- 2024年新改版苏教版六年级下册科学全册知识点(精编版) .pdf
- YDT 2319-2020数据设备用网络机柜.pdf
- 2025年《可爱的中国》新疆地方教材(小学版)教案范文.docx VIP
- 《星巴克的中国市场营销策略分析的调查报告》3100字.pdf VIP
- 建筑工程技术毕业设计开题报告.docx VIP
- 施工图说明模板及样图-建筑.pdf VIP
文档评论(0)