- unforgeable signature
- неподдающаяся подделке подпись
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Group signature — A Group signature scheme is a method for allowing a member of a group to anonymously sign a message on behalf of the group. The concept was first introduced by David Chaum and Eugene van Heyst in 1991. For example, a group signature scheme could… … Wikipedia
Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… … Wikipedia
Rabin signature algorithm — In cryptography the Rabin Signature Scheme is a method of Digital signature originally proposed by Michael O. Rabin in 1979. The Rabin Signature Scheme was one of the first digital signature schemes proposed, and it was the first to relate the… … Wikipedia
Digital signature forgery — In a cryptographic digital signature or MAC system, digital signature forgery is the ability to create a pair consisting of a message m and a signature (or MAC) σ that is valid for m, where m has not been signed in the past by the legitimate… … Wikipedia
BLS (Cryptography) — In cryptography, the Boneh Lynn Shacham signature scheme allows a user to verify that a signer is authentic . The scheme uses a pairing function for verification and signatures are group elements in some elliptic curve. Working in an elliptic… … Wikipedia
Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through … Wikipedia
Full Domain Hash — In cryptography, the Full Domain Hash (FDH) is an RSA based signature scheme that follows the hash and sign paradigm. It is provably secure (i.e, is existentially unforgeable under adaptive chosen message attacks) in the random oracle model. FDH… … Wikipedia
Existential forgery — In a digital signature or Message Authentication Code (MAC) system, an existential forgery is the creation (by an adversary) of any message m and a valid signature (or MAC) sigma for m, where m has not been signed or MACed in the past by the… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Quantum cryptography — Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt… … Wikipedia