Examples of ASBB in a sentence
Our idea is to generate the public key of an ASBB scheme in a distributed manner, such that only each member can obtain a signature under this public key.
Unless another date is agreed to by Buyer and ASBB prior to the Effective Time, the “Mailing Date” shall be the date on which the Proxy Statement/Prospectus is first mailed to holders of ASBB Common Stock.
In an ASBB scheme, the public key can be simultaneously used to verify signatures and en- crypt messages, and any valid signature can be used to decrypt ciphertexts un- der this public key; furthermore, an ASBB scheme satisfies the key-homomorphic property and the aggregatability property.
No claim for indemnity has been made or, to the Knowledge of ASBB, threatened by any director, officer, employee, independent contractor, or agent to any ASBB Entity and, to the Knowledge of ASBB, no basis for any such claim exists.
Each of Buyer and its Subsidiaries and ASBB and its Subsidiaries shall file all reports required to be filed by it with Regulatory Authorities between the date of this Agreement and the Effective Time and shall make available to the other Party copies of all such reports promptly after the same are filed.
As a consequence, the combined signature can be used as a decryption key of the new ASBB instance.
The security of an ASBB scheme incorporates the standard notion of security for a signature scheme, i.e., existential unforgeability under a chosen message attack (EUF-CMA) [18] and the security as an encryption scheme.
If the exercise price per share of any such ASBB Option is equal to or greater than the Cash Consideration, such ASBB Option shall be cancelled without any cash payment being made in respect thereof.
Aggregatability states that the combination of secure ASBB instances produces a new secure ASBB instance.
It exploits the duality between decryption keys and signatures which has been noticed in ID-based encryption [3] and certificate-based encryption [17], but the encryption in ASBB does not take input the receivers’ identities.