• Threshold cryptography provides a way in which the secret key can be shared secretly.

    门限密码学提供了一种安全密钥共享方法

    youdao

  • Combined public key and threshold cryptography are applied to key management for Mobile Ad Hoc Network (MANET) in this paper.

    组合公钥技术门限密码理论结合应用于移动自组网的密钥管理方案中。

    youdao

  • Distributed multiplication computation is an important part of secure multi-party computation and a basic protocol of threshold cryptography.

    分布式乘法计算安全多方计算中的重要部分,也是设计门限密码体制基本协议

    youdao

  • This paper proposes a threshold multi-proxy blind multi-signature scheme based on elliptic curve by adopting threshold cryptography and blind signature scheme.

    结合椭圆曲线密码体制、门限密码技术签名方案该文提出了一种基于椭圆曲线可验证的门限盲签名方案。

    youdao

  • This paper presents a new verifiable threshold blind signature scheme based on the elliptic curve by adopting threshold cryptography and blind signature scheme.

    结合椭圆曲线密码体制、门限密码技术签名方案该文提出了种基于椭圆曲线可验证的门限盲签名方案。

    youdao

  • Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.

    目前为止,学术界对于基于门限密码学入侵容忍研究几乎都集中门限rsa密码技术的应用上。

    youdao

  • Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.

    目前为止,学术界对于基于门限密码学入侵容忍研究几乎都集中门限rsa密码技术的应用上。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定