USign Queries Sample Clauses

USign Queries. E can request an undeniable signature for input (XI, m) where XI ∈ X , and m ∈ M. If XI XJ then B runs USign(xI, m) to produce a signature σ ∈ S. If XI = XJ then B queries m on the H1 oracle and receives some response gri . If the tuple on LH1 containing m is the kth tuple, then B aborts. Otherwise B retrieves the value ri from the tuple containing m on LH1 outputs σ. and computes σ = Xri mod p. B Conf/Deny Queries: E can request a confirmation or denial proof for input (XP , XV , m, σ) where XP , XV ∈ X , XV =ƒ XP , m ∈ M and σ ∈ S. B keeps a list LCD of all distinct Conf/Deny queries that E makes. Case 1 If XP ƒ= XJ then C takes the private key xP corresponding to XP and proceeds as follows. C runs ConfGen(XP , XV , xP , m, σ) to produce an NIDV proof πC ∈ PC. If ConfVerify(XP , XV , m, σ, πC) returns accept, then C outputs πC. Other- wise C runs DenyGen(XP , XV , xP , m, σ) to produce an NIDV proof πD ∈ PD which it outputs. Case 2 If XP = XJ then B queries m on the H1 oracle. If the tuple (m, ri) on LH1 containing m is not the kth tuple, B retrieves the value ri from the tuple on LH1 and computes σj = Xri mod p. Case 2a If σj = σ then B simulates ConfGen by simulating an NIDV EDL proof as follows. B picks random w, r, t, h ∈ Zq and computes: c = gwXr mod p G = gdX(h+w) mod p D = H1(m)dσ(h+w) mod p If the H2 oracle has previously been queried on input c, G, D, m, σ, XP , XV , then B starts again by picking new w, r, t, h. Otherwise B sets str = c, G, D, m, σ, XP , XV , adds the tuple (str, h) to LH2 , and outputs πC = (w, r, h, d). Case 2b If XP = XJ , and σj =ƒ σ or (m, ri) is the kth tuple on LH1 , then B proceeds as follows. If (m, ri) is the kth tuple on LH1 , then B selects some random value y ∈ Zq∗ and computes σj = gbriy = H1(m)y mod p. If σj = σ, then B starts again by picking a new y. Now B has some value σj ƒ= σ (generated at the beginning of Case 2 or in Case 2b) and B simulates DenyGen by simulating an NIDV IDL proof as follows. B picks random t, w, r, h, d1, d2 ∈ Zq and computes: C = ( σj )t mod p σ c = gwXr mod p G = gd1 X−d2 mod p D = Ch+wH1(m)d1 σ−d2 mod p If the H2 oracle has previously been queried on input C, c, G, D, m, σ, XP , XV , then B starts the DenyGen simulation again by picking new t, w, r, h, d1, d2. Otherwise B sets str = C, c, G, D, m, σ, XP , XV , adds the tuple (str, h) to LH2 , and outputs πD = (C, w, r, h, d1, d2).
AutoNDA by SimpleDocs

Related to USign Queries

  • Customer List The Administrative Agent shall have received a true and complete customer list for each Borrower and its Domestic Subsidiaries, which list shall state the customer’s name, mailing address and phone number and shall be certified as true and correct in all material respects by a Financial Officer of the Borrower Representative.

  • Internet Use Customer assumes total responsibility for its and its users’ use of the Internet. Masergy specifically disclaims any warranties, endorsements or representations regarding any merchandise, information, software, products, data, files, or services provided through the Internet.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format:

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • WHOIS query RTT Refers to the RTT of the sequence of packets from the start of the TCP connection to its end, including the reception of the WHOIS response. If the RTT is 5-­‐times or more the corresponding SLR, the RTT will be considered undefined.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Publicity and Use of Trademarks or Service Marks 34.1 A Party, its Affiliates, and their respective contractors and Agents, shall not use the other Party’s trademarks, service marks, logos or other proprietary trade dress, in connection with the sale of products or services, or in any advertising, press releases, publicity matters or other promotional materials, unless the other Party has given its written consent for such use, which consent the other Party may grant or withhold in its sole discretion. 34.2 Neither Party may imply any direct or indirect affiliation with or sponsorship or endorsement of it or its services or products by the other Party. 34.3 Any violation of this Section 34 shall be considered a material breach of this Agreement.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Metadata Where the Contractor has or generates metadata as a result of services provided to the Province, where that metadata is personal information, the Contractor will: not use it or disclose it to any other party except where the Agreement otherwise specifies; and remove or destroy individual identifiers, if practicable.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!