• 提出一种可追踪名者的签密方案

    This paper proposes a signer-traceable ring signcryption scheme.

    youdao

  • 首先提出一个基于椭圆曲线码体制方案

    In this paper, a signature encryption scheme based on ellipse curve cryptosystem is proposed.

    youdao

  • 基于签密方案提出种一对多的传输协议

    Based on the signcryption scheme, this paper proposed a new secret transferring protocol.

    youdao

  • 该文应用双线性提出一个基于身份代理签密方案

    This paper proposes an identity-based proxy signcryption scheme from bilinear pairings.

    youdao

  • 尤其长消息中,方案能够更好的满足应用需求。

    Therefore, the proposition could be more applicable especially when used in long-message signcryption.

    youdao

  • 分析表明方案满足签密安全性要求具有更高效率

    Analysis shows that this proposal meets the safety and high efficiency requirement of Signcryption.

    youdao

  • 通过引入者秘信息,实现生成中心不可诬陷性。

    Our scheme can resist the private key generator to entrap through the introduction of secret information of the signcryptioner.

    youdao

  • 基于身份椭圆曲线线性提出一种新的多重签密方案

    Based on identity and bilinear pairing on the Elliptic Curve, a new multi-signcryption scheme is proposed.

    youdao

  • 与典型的基于身份门限签密方案相比效率更高实用性强。

    Our scheme is more efficient and practical than the existing scheme.

    youdao

  • 然而方案不能传统方法那样同时提供前向安全性公开验证性。

    But signcryption schemes cannot provide forward secrecy and public verifiability as the traditional method does.

    youdao

  • 为了克服一缺陷本文使用门限技术设计了安全的身份签密方案

    To overcome this weakness, the threshold technology was used to devise a secure ID-based signcryption scheme.

    youdao

  • 针对一个接收者基于身份方案,从签密方案安全属性入手分析安全性

    Aiming at an identity-based signcryption scheme for multi-receiver beginning with the security attribute, this paper studies the security property of this scheme.

    youdao

  • 综合自认证公钥体制思想,使用双线性提出一个安全高效的自认证签密方案

    By integrating the concepts of self-certified public key and signcryption, a secure and efficient self-certified signcryption scheme from bilinear pairings is proposed.

    youdao

  • 给出了三种攻击指出于刚提出的前向安全基于身份的代理签密方案安全的。

    Three attacks on Yu Gang et al's scheme to show that their forward secure proxy-signcryption scheme based on identity is insecure.

    youdao

  • 协议满足数字签密协议、不可伪造性等要求,并抵抗目前情况下的各种攻击

    The new protocol satisfies all the requirements of the confidentiality and unforgeability by signcryption protocol, and it can defend against all those current attacks.

    youdao

  • 数字一种功能数字是公钥加算法数字更高层次上的结合

    Digital signcryption is a new kind of digital signature which integrates public key encryption and signature simultaneously in a logic step.

    youdao

  • 基于修改过的W - B方案,该文设计出种带有离线的、透明可信的第三方认证邮件协议。

    We modify existing W-B signcryption scheme so that it can be used by certified email protocols, and based on the modified scheme we propose a new certified email protocol.

    youdao

  • 改进门限代理协议利用接收方公钥不是验证签密结果验证过程第三公开

    Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.

    youdao

  • 技术不经意传递技术结合起来提出个基于签密安全多方乘积协议对其进行了分析

    A secure multi-party multiplication protocol using the techniques of signcryption and oblivious transfer has been proposed and analyzed.

    youdao

  • 提出一个基于身份的多消息接收者算法,新算法同时多个接收者多个消息进行签密

    An ID-based multi-message and multi-receiver signcryption algorithm was proposed, which could simultaneously signcrypt lots of messages for lots of receivers.

    youdao

  • 满足这样需求我们利用双线性配对的特性结构以及基于属性码体制结构,定义了基于属性的签密方案

    To meet this demand, based on bilinear pairing and attribute-based cryptosystem, we build up an attribute-based signcryption scheme.

    youdao

  • 最后上述研究基础上,结合椭圆曲线的双线性对,设计了一个基于身份方案应用安全电子邮件系统中。

    Finally, a Signcryption Scheme based on Bilinear Pairings is designed according to the Bilinear Pairings of elliptic curve, and put into use in security Email system.

    youdao

  • 安全分析结果表明,与L - L - C - Z门限代理协议相比改进门限代理签密协议能够承受接收方公钥替换攻击

    Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.

    youdao

  • 安全分析结果表明,与L - L - C - Z门限代理协议相比改进门限代理签密协议能够承受接收方公钥替换攻击

    Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定