英语人>网络例句>可签名的 相关的搜索结果
网络例句

可签名的

与 可签名的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Then, a self-certified anonymous proxy signature scheme based on the view of self-certified public key policy and the scheme of anonymous proxy signature are proposed. The proposed scheme not only lightens the burden of verifier, but also has characteristics such as anonymousness and trackability.

然后,结合自证明公钥体制和匿名代理签名,设计出一种自证明匿名代理签名方案,此方案不仅能减轻验证者的负担,还具有匿名性和可跟踪性的特点。

Identifiability is one of several security requirements of genera proxy signature schemes, i.

可识别性是一般代理签名方案的一个特点,即验证者能够从代理签名巾确定代理者的身份。

Besides,in order to improve the efficiency of the signature in some cases,the schemes can be converted to a constant-size self linkable threshold ring signature.

此外,在某些情况下,该方案可以转化为常数大小自主可链接的门限环签名,从而提高签名效率。

I think we walked passed him without saying anything, or maybe Jen walked up to him and asked him to sign her Playbill, since she didn't have a chance to get an autograph before the play.

我想我们走过他身旁时别再打扰他了,可Jen走到他近前,请他给她的话剧票根上签名,因为她在看话剧之前还没有机会获得Matthew的签名呢。

A mark or signature placed on a piece of mail to indicate the right to send it free of charge.

免费邮戳或签名盖于邮件上的印戳或签名,以表明具有可免费送到的权利

The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. In addition, itcan realize the unknowability ofgroup's secretby constructing a secure distributed key generation protoco.l As a resul,t the proposed scheme is more secure than the two schemes.

结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的分布式密钥生成协议保证群私钥的不可知性,因此比现有方案具有更高的安全性。

Meanwhile, a confirmer is able to transfer a confirmer signature into a general signature that can be verified by anyone if he or she can obtain it.

同时证实者具有转化一个证实签名为一个普通数字签名(即:可被任何人公开验证)的能力。

We first analyze the advantages and disadvantages of ID-Based group signature and provably secure group signature.

2我们首先分析了基于身份的群签名方案和可证明安全的群签名方案的优缺点。

Aggregate signature and its applications on constructing verifiably encrypted signature scheme are studied.

研究了聚集签名技术及其应用于可验证加密签名体制的构建方法。

An Identity-based verifiably encrypted signature scheme using bilinear pairings on ellipse curve was constructed, and a new fair multi-party exchange protocol was designed.

利用椭圆曲线上的双线性对构造基于身份的可验证加密签名方案,基于这种签名方案构建了一种新的多方公平交换协议。

第4/8页 首页 < 1 2 3 4 5 6 7 8 > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。