- 1、本文档共7页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
A randomized protocol for signing contracts-英文文献
40 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 36. NO. 1.JANUARY 1990
A Fair Protocol for Signing Contracts
MICHAEL BEN-OR, ODED GOLDREICH, SILVIO MICALI, AND RONALD L. RIVEST
Abtract-Two parties, A and B , want to sign a contract C over a valid one. An instance of a signature scheme may be
communication network. To do so,they must “simultaneously” exchange provided by ordinary “hand-written” signatures. Hand-
their commitments to C. Since simultaneous exchange is usually impossi-
ble in practice, protocols are needed to approximate simultaneity by written signatures are believed to be hard to forge and can
exchanging partial commitments in piece by piece manner. During such a be universally verified as trusted notary publics keep sam-
protocol, one party or another may have a slight advantage; a “fair” ples of each user’s signature. Another instance of a signa-
protocol keeps this advantage within acceptable limits. We present a new ture scheme, more suitable for computer networks, is a
protocol that is fair in the sense that, at any stage in its execution, the “digital signature scheme.” This notion was introduced by
conditional probability that one party cannot commit both parties to the
contract given that the other party can, is close to zero. This is true even if Diffie and Hellman [5] and first implemented by Rivest
A and B have vastly different computing powers, and is proved under very et al. [15]. The strongest notion of security for a digital
weak cryptographic assumptions
您可能关注的文档
- A Learning Algorithm for Continually Running Fully Recurrent Neural Networks-英文文献.pdf
- A Limited Memory Algorithm for Bound Constrained Optimization-英文文献.pdf
- A Long-Memory Property of Stock Market Returns and a New Model-英文文献.pdf
- A message ferrying approach for data delivery in sparse mobile ad hoc networks-英文文献.pdf
- A learning algorithm for Boltzmann machines-英文文献.pdf
- A Meta-Analytic Review of Experiments Examining the Effects of Extrinsic Rewards on Intrinsic Motivation-英文文献.pdf
- A Model of Saliency-based Visual Attention for Rapid Scene Analysis-英文文献.pdf
- A New Extension of the Kalman Filter to Nonlinear Systems-英文文献.pdf
- A New Kind of Science-英文文献.pdf
- A Morphable Model For The Synthesis Of 3D Faces-英文文献.pdf
- GBZ 30993-2014 测量、控制和实验室用电气设备的安全要求 GB 4793.1-2007的符合性验证报告格式.docx
- T_GDPAWS 31-2024 牲畜屠宰企业安全生产标准化建设与评审规范.docx
- T_CFIAS 3022-2023 饲料添加剂 丝氨酸.docx
- T_CFIAS 3013-2023 饲料添加剂 L-亮氨酸.docx
- T_EERT 048-2024 山塘淡水养殖生态容量评估技术导则.docx
- T_EERT 047-2024 淡水池塘养殖尾水生物强化脱氮技术规范.docx
- T_EERT 046-2024 山塘淡水养殖水体原位修复技术规范.docx
- T_GZDJK 001-2024 白及胶冻干粉制造通用技术.docx
- JB∕T 8543-2015 泵产品零件无损检测 泵受压铸钢件射线检测.docx
- JB∕T 12234-2015 铠装加热电缆.docx
文档评论(0)