查询词典 signature
- 与 signature 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In this paper, an improved confirmer digital signature is presented according to the analysis of the traditional confirmer signature algorithm and the introduction of zero-knowledge proof.
证实数字签名是在不可否认数字签名的基础上提出的一种新的具有特殊用途的数字签名方案。
-
In this paper, an improved confirmer digital signature is presented according to the analysis of the traditional confirmer signature algorithm and the introduction of zero-knowledge proof.
本文在分析已有证实数字签名算法缺陷的基础上,将零知识证明引入证实数字签名,提出了一个改进的证实数字签名方案。
-
A confirmer signature scheme based on RSA is proposed. It is showed that the new scheme is an implementation of secure and efficient confirmer signature.
提出了一种完全基于RSA的证实数字签名方案,分析表明,该方案是一种安全而高效的证实数字签名实现方案。
-
An improved confirmer digital signature scheme was presented based on the analysis of the disadvantages of traditional confirmer signature algorithm and the introduction of zeroknowledge proof.
证实数字签名是在不可否认数字签名的基础上提出的一种新的具有特殊用途的数字签名方案。
-
The subscriber's security and the confirmer signature invisibility are characteristic to a confirmer signature scheme.
签名者的安全性和证实签名的&不可见性&是一个证实数字签名方案必须具备的两个重要特性。
-
Digital signature algorithm DSA is firstly used in confirmer signature and the new scheme has complete convertibility.
目的在于提供所谓的前向安全性:既使当前时段的秘密钥泄露没,对手也不能伪造与过去时段有关的数字签名。
-
Meanwhile, a confirmer is able to transfer a confirmer signature into a general signature that can be verified by anyone if he or she can obtain it.
同时证实者具有转化一个证实签名为一个普通数字签名(即:可被任何人公开验证)的能力。
-
Considering the insecurity [3~5] or inefficiency[6] of current confirmer signature schemes,born of the canmenisch-michels formal model and structure,a new confirmer signature scheme based on DSA and RSA is proposed.
考虑到现存的证实数字签名方案或者是不安全的[3~5],或者是低效的[6],基于Canmenisch-Michels形式化模型和结构,提出一种新颖的完全基于DSA及RSA的证实数字签名方案。
-
We formalize a notion of security for proxy multi-signature and multi-proxy signature, i.e., existentially unforgeability under an adaptive chosen-message attack and an adaptive chosenwarrant attack.
本文给出了代理多重签名和多重代理签名的安全定义,即适应性选择消息攻击和适应性选择授权文件攻击下的不可存在性伪造,并建立了形式化安全模型。
-
Harn and Kiesler proposed a public-key cryptosystem, digital signature and authentic encryption scheme based on Rabin's cryptosystem, in this chapter, we will analyze the security of H-K digital signature scheme and H-K authentic encryption scheme, and point out that these cryptosystem are insecure.
Shao设计了两种数字签名方案,并称这两种数字签名的安全性建立同时在离散对数和素因子分解问题之上。
- 相关中文对照歌词
- Someday (I Will Understand) (Hi-Bias Signature Radio Remix)
- Signature
- Signature Of Divine (Yahweh)
- My Signature Move
- 推荐网络例句
-
Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.
在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。
-
In fact,I've got him on the satellite mobile right now.
实际上 我们已接通卫星可视电话了
-
The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.
世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。