In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by th...In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.展开更多
A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the cons...A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys.展开更多
严歌苓代表作《扶桑》在中西文化之间以及历史与现实之间建构了扶桑等典型的"中国形象",其译作The Lost Daughter of Happiness以西方文化期待为依归对原作中的人物形象进行了一定程度的"修正"。本文通过对原作和...严歌苓代表作《扶桑》在中西文化之间以及历史与现实之间建构了扶桑等典型的"中国形象",其译作The Lost Daughter of Happiness以西方文化期待为依归对原作中的人物形象进行了一定程度的"修正"。本文通过对原作和译作中扶桑这一东方女性形象和大勇等华工移民群像的对比分析,发现中国形象在创作和翻译的共谋中先后经历了"双重东方化"的建构,从而迎合了目的语读者的文化期待,使东方成为不断被边缘化的"套话式的"他者形象。这种"双重东方化"的建构,本质上乃是西方话语霸权下的单向交流。展开更多
文摘In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.
文摘A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys.
文摘严歌苓代表作《扶桑》在中西文化之间以及历史与现实之间建构了扶桑等典型的"中国形象",其译作The Lost Daughter of Happiness以西方文化期待为依归对原作中的人物形象进行了一定程度的"修正"。本文通过对原作和译作中扶桑这一东方女性形象和大勇等华工移民群像的对比分析,发现中国形象在创作和翻译的共谋中先后经历了"双重东方化"的建构,从而迎合了目的语读者的文化期待,使东方成为不断被边缘化的"套话式的"他者形象。这种"双重东方化"的建构,本质上乃是西方话语霸权下的单向交流。