Therefore, using the method of the formalization, the security property of Kim's proxy-protected proxy signature system which based on schnorr system with orcal model in face of the adapt pick message attacking is analyzed.2.
因此,本文利用形式化分析的方法,分析了基于Schnorr签名的KIM代理保护代理签名体制在Orcal模型下对自适应选择消息攻击的安全性。
参考来源 - 代理签名体制的研究·2,447,543篇论文数据,部分数据来源于NoteExpress
出于本文的目的,您可将公有bean视为使用代理保护的不安全的私有bean。
For the purpose of this article, you can think of public beans as unsecured and private ones as being secured by proxy.
通过优化不经意传输(OT)协议,提出一种基于非交互保密函数计算的移动代理保护新方案。
A mobile agent protection scheme based on the non-interactive secure function evaluation was presented using an optimized oblivious transfer (ot) protocol.
论文通过优化不经意传输(OT)协议,提出了一个新的基于非交互保密函数计算的移动代理保护方案。
A mobile agent protection scheme based on non-interactive secure function evaluation was presented using an optimized oblivious transfer (ot) protocol.
应用推荐