Threshold cryptography provides a way in which the secret key can be shared secretly.
门限密码学提供了一种安全的密钥共享方法。
Combined public key and threshold cryptography are applied to key management for Mobile Ad Hoc Network (MANET) in this paper.
将组合公钥技术和门限密码理论结合应用于移动自组网的密钥管理方案中。
Distributed multiplication computation is an important part of secure multi-party computation and a basic protocol of threshold cryptography.
分布式乘法计算是安全多方计算中的重要部分,也是设计门限密码体制的基本协议。
This paper proposes a threshold multi-proxy blind multi-signature scheme based on elliptic curve by adopting threshold cryptography and blind signature scheme.
结合椭圆曲线密码体制、门限密码技术和盲签名方案,该文提出了一种基于椭圆曲线可验证的门限盲签名方案。
This paper presents a new verifiable threshold blind signature scheme based on the elliptic curve by adopting threshold cryptography and blind signature scheme.
结合椭圆曲线密码体制、门限密码技术和盲签名方案,该文提出了一种基于椭圆曲线可验证的门限盲签名方案。
Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.
到目前为止,学术界对于基于门限密码学的入侵容忍研究几乎都集中在门限rsa密码技术的应用上。
Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.
到目前为止,学术界对于基于门限密码学的入侵容忍研究几乎都集中在门限rsa密码技术的应用上。
应用推荐