英语人>网络例句>key signature 相关的网络例句
key signature相关的网络例句

查询词典 key signature

与 key signature 相关的网络例句 [注:此内容来源于网络,仅供参考]

Then, a self-certified anonymous proxy signature scheme based on the view of self-certified public key policy and the scheme of anonymous proxy signature are proposed. The proposed scheme not only lightens the burden of verifier, but also has characteristics such as anonymousness and trackability.

然后,结合自证明公钥体制和匿名代理签名,设计出一种自证明匿名代理签名方案,此方案不仅能减轻验证者的负担,还具有匿名性和可跟踪性的特点。

Considering the key to the bivariate simple equation is innumerability and the high security, we use Schnorr's signature scheme and Wu et al.'s signature scheme, present a new multi-signature scheme based on the bivariate simple equation.

我们分析研究了基于Schnorr方案和吴挺等数字签名方案,提出了基于离散对数问题并以二元一次不定方程为基础的一个多重数字签名方案。

One important application of public key cryptosystem is digital signature, and signature scheme based on sharing secret is a good method to enhance the security of signature system.

公钥体制的一个主要应用是数字签名,而基于秘密共享的签名方案是提高数字签名系统安全性的好方法。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

This paper has obtained following three results about the new scheme:(1) The hardness of recovering the private key from the public key is based on the hardness of the shortest vector problems of several lattices;(2) The hardness of forging a signature is equivalent to the hardness of the closest vector problem of some lattice;(3) Each signature will leak information on the private key,but the final shape of the unlimited leakage is just a group of complicated non-linear equations.

文中给出新方案的3个结果:(1)由公钥恢复出私钥的困难性基于若干格上的最小向量问题;(2)由公钥伪造签名的困难性等价于某个格上的最近向量问题;(3)每个签名值仍然会泄露私钥的一些信息,但无限制泄露的最终形式只是关于私钥的一组复杂的非线性方程。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

First,the number of group members is not fixed in the setup phase and the group public key is unchanged.Second,an entity can join the group at any time and obtain a private signing key without refashioning other group members' private signing key.Third,the identity of the group signature can be open by the authority and the procedure of the tracing can be check by anybody.

该方案有下列特点:在建群阶段不需要确定成员的数目并且群公钥固定不变;任何时候实体都能通过群权威加入到群中获得签名私钥并且无需更新其他成员的签名私钥;能通过群权威揭示签名人的身份并且这一过程是可验证的。

A tonal system consisting of seven tones in fixed relationship to a tonic,having a characteristic key signature and being since the Renaissance the structural foundation of the bulk of Western music; tonality .

调、主音包括七个与主音有固定关系的音色的调音系统,有独特的调号,自文艺复兴以来一直是西方音乐主体的结构基础;调性到中国译典经典版本中查找关于tonality的最新解释和例句。。。。

The secret key operates on the message hash generated by SHA-1; to verify a signature, one recomputes the hash of the message, uses the public key to decrypt the signature and then compares the results.

密钥运行在由SHA-1产生的消息哈希;为了验证一个签名,要重新计算消息的哈希,使用公钥解密签名然后比较结果。

第2/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

Objective To investigate the effects of interleukin-1 β converting enzyme gene on the biologic characteristics of ovarian cancer cells.

目的 探讨白细胞介素-1 β转换酶的表达,对卵巢癌细胞生物学特性的影响。

Campylobacter: This illness is the most commonly identified cause of diarrheal illness in the world.

弯曲:这种病是最常见的原因查明腹泻病,在世界上。

Gangs fill the daily lives of many of our poorest and most vulnerable citizens with a terror that the court does not give sufficient consideration, often relegating them to the status of prisoners in their own homes.

法院没有充分的考虑到黑社会的猖獗所带来的恐怖,这使得我们最穷、最可怜的市民每天生活在他们的阴影当中,成为在家的囚犯。