亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 05-05.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Advanced Protocols</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=05//-->
<!--PAGES=111-114//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-06.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Proofs of Membership</I></B></FONT></P>
<P>Alice wants to prove to Bob that she is a member of some super-secret organization, but she does not want to reveal her identity. This problem is similar but different to proving identity, and has also been studied [887,906,907,1201,1445]. Some solutions are related to the problem of group signatures (see Section 4.6).
</P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">5.3 Blind Signatures</FONT></H3>
<P>An essential feature of digital signature protocols is that the signer knows what he is signing. This is a good idea, except when we want the reverse.
</P>
<P>We might want people to sign documents without ever seeing their contents. There are ways that a signer can <I>almost</I>, but not exactly, know what he is signing. But first things first.</P>
<P><FONT SIZE="+1"><B><I>Completely Blind Signatures</I></B></FONT></P>
<P>Bob is a notary public. Alice wants him to sign a document, but does not want him to have any idea what he is signing. Bob doesn&#146;t care what the document says; he is just certifying that he notarized it at a certain time. He is willing to go along with this.
</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice takes the document and multiplies it by a random value. This random value is called a <B>blinding factor</B>.
<DD><B>(2)</B>&nbsp;&nbsp;Alice sends the blinded document to Bob.
<DD><B>(3)</B>&nbsp;&nbsp;Bob signs the blinded document.
<DD><B>(4)</B>&nbsp;&nbsp;Alice divides out the blinding factor, leaving the original document signed by Bob.
</DL>
<P>This protocol only works if the signature function and multiplication are commutative. If they are not, there are other ways to modify the document other than by multiplying. Some relevant algorithms appear in Section 23.12. For now, assume that the operation is multiplication and all the math works.
</P>
<P>Can Bob cheat? Can he collect any information about the document that he is signing? If the blinding factor is truly random and makes the blinded document truly random, he cannot. The blinded document Bob signs in step (2) looks nothing like the document Alice began with. The blinded document with Bob&#146;s signature on it in step (3) looks nothing like the signed document at the end of step (4). Even if Bob got his hands on the document, with his signature, after completing the protocol, he cannot prove (to himself or to anyone else) that he signed it in that particular protocol. He knows that his signature is valid. He can, like anyone else, verify his signature. However, there is no way for him to correlate any information he received during the signing protocol with the signed document. If he signed a million documents using this protocol, he would have no way of knowing in which instance he signed which document.</P>
<P>The properties of completely blind signatures are:</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;Bob&#146;s signature on the document is valid. The signature is a proof that Bob signed the document. It will convince Bob that he signed the document if it is ever shown to him. It also has all of the other properties of digital signatures discussed in Section 2.6.
<DD><B>2.</B>&nbsp;&nbsp;Bob cannot correlate the signed document with the act of signing the document. Even if he keeps records of every blind signature he makes, he cannot determine when he signed any given document.
</DL>
<P>Eve, who is in the middle, watching this protocol, has even less information than Bob.
</P>
<P><FONT SIZE="+1"><B><I>Blind Signatures</I></B></FONT></P>
<P>With the completely blind signature protocol, Alice can have Bob sign anything: &#147;Bob owes Alice a million dollars,&#148; &#147;Bob owes Alice his first-born child,&#148; &#147;Bob owes Alice a bag of chocolates.&#148; The possibilities are endless. This protocol isn&#146;t useful in many applications.
</P>
<P>However, there is a way that Bob can know what he is signing, while still maintaining the useful properties of a blind signature. The heart of this protocol is the cut-and-choose technique. Consider this example. Many people enter this country every day, and the Department of Immigration wants to make sure they are not smuggling cocaine. The officials could search everyone, but instead they use a probabilistic solution. They will search one-tenth of the people coming in. One person in ten has his belongings inspected; the other nine get through untouched. Chronic smugglers will get away with their misdeeds most of the time, but they have a 10 percent chance of getting caught. And if the court system is effective, the penalty for getting caught once will more than wipe out the gains from the other nine times.</P>
<P>If the Department of Immigration wants to increase the odds of catching smugglers, they have to search more people. If they want to decrease the odds, they have to search fewer people. By manipulating the probabilities, they control how successful the protocol is in catching smugglers.</P>
<P>The blind signature protocol works in a similar manner. Bob will be given a large pile of different blinded documents. He will <B>open</B>, that is examine, all but one and then sign the last.</P>
<P>Think of the blinded document as being in an envelope. The process of blinding the document is putting the document in an envelope and the process of removing the blinding factor is opening the envelope. When the document is in an envelope, nobody can read it. The document is signed by having a piece of carbon paper in the envelope: When the signer signs the envelope, his signature goes through the carbon paper and signs the document as well.</P>
<P>This scenario involves a group of counterintelligence agents. Their identities are secret; not even the counterintelligence agency knows who they are. The agency&#146;s director wants to give each agent a signed document stating: &#147;The bearer of this signed document, (insert agent&#146;s cover name here), has full diplomatic immunity.&#148; Each of the agents has his own list of cover names, so the agency can&#146;t just hand out signed documents. The agents do not want to send their cover names to the agency; the enemy might have corrupted the agency&#146;s computer. On the other hand, the agency doesn&#146;t want to blindly sign any document an agent gives it. A clever agent might substitute a message like: &#147;Agent (name) has retired and collects a million-dollar-a-year pension. Signed, Mr. President.&#148; In this case, blind signatures could be useful.</P>
<P>Assume that all the agents have 10 possible cover names, which they have chosen themselves and which no one else knows. Also assume that the agents don&#146;t care under which cover name they are going to get diplomatic immunity. Also assume that the agency&#146;s computer is the Agency&#146;s Large Intelligent Computing Engine, or ALICE, and that our particular agent is the Bogota Operations Branch: BOB.</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;BOB prepares <I>n</I> documents, each using a different cover name, giving himself diplomatic immunity.
<DD><B>(2)</B>&nbsp;&nbsp;BOB blinds each of these documents with a different blinding factor.
<DD><B>(3)</B>&nbsp;&nbsp;BOB sends the <I>n</I> blinded documents to ALICE.
<DD><B>(4)</B>&nbsp;&nbsp;ALICE chooses <I>n</I> &#150; 1 documents at random and asks BOB for the blinding factors for each of those documents.
<DD><B>(5)</B>&nbsp;&nbsp;BOB sends ALICE the appropriate blinding factors.
<DD><B>(6)</B>&nbsp;&nbsp;ALICE opens (i.e., she removes the blinding factor) <I>n</I> &#150; 1 documents and makes sure they are correct&#151;and not pension authorizations.
<DD><B>(7)</B>&nbsp;&nbsp;ALICE signs the remaining document and sends it to BOB.
<DD><B>(8)</B>&nbsp;&nbsp;Agent removes the blinding factor and reads his new cover name: &#147;The Crimson Streak.&#148; The signed document gives him diplomatic immunity under that name.
</DL>
<P>This protocol is secure against BOB cheating. For him to cheat, he would have to predict accurately which document ALICE would not examine. The odds of him doing this are 1 in <I>n</I>&#151;not very good. ALICE knows this and feels confident signing a document that she is not able to examine. With this one document, the protocol is the same as the previous completely blinded signature protocol and maintains all of its properties of anonymity.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="05-04.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="05-06.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产一区美女在线| 亚洲国产精华液网站w| 一区二区三区在线免费视频| 国产一区二区三区综合| 欧美一区二区三区免费观看视频| 午夜私人影院久久久久| 欧美色倩网站大全免费| 亚洲国产欧美在线人成| 欧美日韩一二三| 亚洲成人高清在线| 欧美一区二区福利在线| 美女久久久精品| 久久男人中文字幕资源站| 麻豆精品视频在线观看免费| 欧美色图12p| 91国偷自产一区二区使用方法| 中文字幕在线观看一区二区| 成人h精品动漫一区二区三区| 国产精品全国免费观看高清| 亚洲一二三区视频在线观看| 蜜臀久久99精品久久久久宅男| 日韩一区二区三区在线| 国内成+人亚洲+欧美+综合在线| 国v精品久久久网| 国产很黄免费观看久久| 精品少妇一区二区三区免费观看 | 欧美一区二区视频网站| 色哟哟一区二区在线观看| 欧美日韩国产成人在线免费| 69堂成人精品免费视频| 亚洲日本在线天堂| 欧美日韩一区二区不卡| 国内精品在线播放| 亚洲天堂av一区| 欧美一区二区三区四区在线观看| 成人免费毛片高清视频| 婷婷激情综合网| 久久蜜桃av一区二区天堂 | 一二三区精品福利视频| 日韩一区二区麻豆国产| 大尺度一区二区| 香蕉影视欧美成人| 国产欧美中文在线| 欧美日韩一区在线观看| 国产一区二区剧情av在线| 一区二区三区四区在线| 国产视频911| 欧美日韩精品欧美日韩精品一综合| 精品一区二区在线播放| 一区二区三区视频在线看| 久久综合久色欧美综合狠狠| 欧美视频一二三区| 成人动漫视频在线| 国产乱码精品一区二区三| 亚洲一区二区影院| 国产精品无圣光一区二区| 91精品国产91综合久久蜜臀| 91丨porny丨在线| 国产一区二区精品久久| 视频一区二区三区入口| 亚洲天堂成人在线观看| 国产精品美女久久久久久久久久久| 欧美日韩午夜精品| 色拍拍在线精品视频8848| 国产精品18久久久久久久久久久久 | 精品影视av免费| 一区二区三区鲁丝不卡| 亚洲桃色在线一区| 欧美国产乱子伦| 久久久久久久国产精品影院| 欧美一区日韩一区| 欧美日韩国产小视频| 色综合久久综合网欧美综合网 | 成人中文字幕合集| 午夜伦理一区二区| 亚洲国产高清aⅴ视频| 国产精品日韩精品欧美在线| 色综合久久88色综合天天 | 免费人成精品欧美精品| 91精品国产综合久久小美女| 国产91精品精华液一区二区三区| 亚洲成人av中文| 欧美极品aⅴ影院| 欧美视频第二页| 丁香激情综合国产| 床上的激情91.| 国产99久久久国产精品潘金网站| 蜜桃视频在线一区| 国产中文字幕精品| 国产成人综合亚洲网站| 国产成人自拍网| 高清shemale亚洲人妖| 成人综合激情网| 本田岬高潮一区二区三区| 成人国产精品视频| 色伊人久久综合中文字幕| 色婷婷综合久久久中文字幕| 欧美午夜理伦三级在线观看| 欧美性一级生活| 7777精品伊人久久久大香线蕉经典版下载| 欧美日韩成人在线| 91精品免费观看| 精品久久一区二区三区| 国产亚洲精品免费| 亚洲欧洲日韩在线| 亚洲第一福利视频在线| 乱一区二区av| 粉嫩绯色av一区二区在线观看| 成人精品视频一区二区三区| 色婷婷av一区| 欧美大片在线观看一区二区| 久久麻豆一区二区| 一区二区中文视频| 五月天婷婷综合| 91精品国产91久久久久久一区二区 | 欧美优质美女网站| 激情综合网天天干| 亚洲免费伊人电影| 午夜亚洲福利老司机| 久久激五月天综合精品| 成人美女在线视频| 欧美三区在线视频| 久久久久综合网| 亚洲黄色免费网站| 免费一级欧美片在线观看| 成人精品在线视频观看| 欧美理论电影在线| 国产日韩欧美不卡| 婷婷丁香激情综合| 99视频精品全部免费在线| 欧美一区二区三区视频| 国产精品美女久久久久久2018| 五月综合激情婷婷六月色窝| 国产成人啪免费观看软件 | 国产一区二区按摩在线观看| 欧美一级二级在线观看| 国产精品免费av| 国产综合久久久久久鬼色| 在线精品视频一区二区三四| 欧美tickling挠脚心丨vk| 中文字幕中文字幕中文字幕亚洲无线| 亚洲尤物视频在线| 成人黄色软件下载| 日韩精品一区二区三区在线观看| 亚洲v日本v欧美v久久精品| 亚洲激情综合网| 青青草国产成人99久久| 99re这里只有精品首页| 精品国产青草久久久久福利| 一区二区三区日韩欧美精品| 亚洲香蕉伊在人在线观| 亚洲少妇屁股交4| 国产精品自拍av| 日韩一区二区在线观看视频| 亚洲一区在线观看免费观看电影高清 | 国产不卡视频在线观看| 51精品国自产在线| 亚洲综合av网| 97se亚洲国产综合自在线不卡| 久久午夜色播影院免费高清| 青青草97国产精品免费观看无弹窗版| 日本韩国一区二区三区视频| 亚洲欧洲成人精品av97| 国产精品18久久久| 久久久久国产精品麻豆ai换脸| 日韩成人免费电影| 欧美日本一区二区| 亚洲va欧美va人人爽| 欧美色精品在线视频| 亚洲午夜精品网| 欧美亚一区二区| 亚洲成人你懂的| 欧洲一区二区三区在线| 一二三四社区欧美黄| 欧美最猛性xxxxx直播| 一区二区三区不卡在线观看 | 偷窥国产亚洲免费视频| 欧美亚男人的天堂| 亚洲 欧美综合在线网络| 欧美日韩亚洲不卡| 日本中文字幕不卡| 日韩精品一区二区三区视频播放 | 国产精品高潮久久久久无| 国产成人亚洲精品狼色在线| 久久久激情视频| 成人爽a毛片一区二区免费| 欧美国产精品专区| 91老师国产黑色丝袜在线| 亚洲精品视频在线| 欧美日韩国产综合一区二区三区 | 成人av在线看| 亚洲欧洲韩国日本视频| 91激情五月电影| 午夜av电影一区| 26uuu国产日韩综合| 中文字幕免费一区| 欧美日韩国产在线播放网站| 91精品一区二区三区在线观看| 国产乱人伦偷精品视频不卡| 亚洲h精品动漫在线观看|