认证权威在数字安全性领域充当一个可信的第三方。
Certificate authorities act as a trusted third party in the world of digital security.
有没有一种办法来建立安全的连接没有可信的第三方?
Is there a way to form secure connections without trusted third parties?
证书用来通过可信的第三方(这里是VeriSign)建立信任关系。
Certificates are used to establish trust by using a trusted third-party (in this case, VeriSign).
可信的第三方通过使用其自己的签名发出证书,为公开密匙和识别信息做证明。
The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.
请注意,经纪人是一个可信的第三方(ttp),在一般情况下,它不是资源有限。
Notice that the broker is a Trusted Third Party (TTP) and, in general, it is not resource-limited.
PKI利用可信的第三方认证机构(CA)签发的数字证书在网络通信中建立和管理信任。
With the digital certification enacted by CA, Public Key Infrastructure (PKI) provides a framework to construct and manage the trust relationship.
基于修改过的W - B签密方案,该文设计出一种带有离线的、透明可信的第三方认证邮件协议。
We modify existing W-B signcryption scheme so that it can be used by certified email protocols, and based on the modified scheme we propose a new certified email protocol.
利用椭圆曲线上盲签名方法,引入认证中心(CA)作为可信的第三方,构建了一个高效的公平电子现金支付方案。
The Certificate Authority(CA) as the trustee third party is introduced, and an efficient fair electronic cash system is established based on the elliptic curve blind digital signature.
数字证书一般是由名为认证中心(Certification Authority,ca)的可信的第三方签发的。
The digital certificate is typically issued by a trusted third party called a Certification Authority (ca). For a fee, the ca will generate a digital certificate that contains.
和服务器的root .crt一样,客户机的root . crt文件包含了由一个可信的第三方CA签名的服务器证书的列表。
As with the server's root.crt, the client's file, root.crt, contains a list of server certificates that have been signed by a reputable third-party ca.
这样,应用程序开发人员就能够把管理用户信息的任务交给可信的第三方资源,这减轻了他们的工作负担,让他们可以集中精力开发应用程序。
This lets application developers offload the task of user profile management to a third-party trusted resource, so they can concentrate on developing the application.
为了防止邮件提供商不想实现这个协议或者它是不可信的,还可以由第三方认证机构来持有公钥。
There can be secondary authorities holding the public key in case the email provider does not want to implement the protocol or it is not reliable.
当然,这又摆出了如何确立可信第三方的身份的自举问题。
Of course, this leaves the bootstrap issue of how you establish the trusted third party's identity.
尽管使用了非常有效且易于管理的可信第三方,但Kerberos也存在一些不足。
Though the use of a trusted third party, Kerberos, is very effective and manageable, it comes with a trade off.
Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。
Kerberos was designed based on secret key cryptography and using trusted third party authentication.
通过将管理公钥基础设施(PublicKey Infrastructure,pki)的复杂性从客户机应用程序提取到一个可信任的第三方机构中,XKMS使得管理PK i变得非常容易。
XKMS allows for easy management of public key infrastructure (PKI) by abstracting the complexity of managing the PKI from client applications to a trusted third party.
该方案使用一个可信第三方实现信任转移,增添一个用户公钥用于建立私钥传输的安全信道。
A trusted third party is employed to transfer trust, and an additional public key is used to set up the secure channel for transmitting the private key.
目前的匿名数字指纹要求可信任的第三方参与,这使得购买者的身份仍旧有可能被泄漏出去。
The present anonymous digital fingerprinting schemes require a trusted third party taking part in, which makes the identity of buyer leaked out.
这个协议解决了可信第三方的性能瓶颈问题,是一个更为有效的、安全的密码协议。
It is a more efficient and secure protocol, which solves the bottleneck problem of trusted third party.
通过以上分析研究,本文提出了“双重的同时生效签名”算法,设计了无可信第三方的电子支付协议。
So we put forward an algorithm of dual concurrent signature and design an electronic payment protocol without the trusted third party (TTP).
然后提出了一种基于可信第三方的安全协议以及一种轻量级IP层的安全机制,对它们进行了详细的分析。
Then the thesis put forward to a kind of security protocol based on trusted third party and a kind of lightweight IP layer security mechanism, and analysed them in details.
在电子商务交易中,为了防止交易抵赖,保证买卖双方在交易时的公平性,可信任的第三方(简称ttp)担任着重要的角色。
In the trade of e-business the trusted third party (TTP) plays an important role in order to avoid trade disavowing and to ensure the square deal.
该系统借助可信第三方技术、数字签名和加密等技术,确保电子交易的安全性和可靠性。
By use of the TTP, digital signature, encryption and decryption technologies, the system guaranteed the security and reliability of thee-business trade.
该方案不需要可信第三方,签名的生成和验证都可以离线完成。
The generation and verification of signature can be performed off-line and a trusted third party isn't involved in the scheme.
文章提出了一种公平的依赖可信第三方的反拒认协议,同时解决了收方和发方的拒认问题。
This paper proposes a fair non-repudiation protocol to solve repudiation problem both in sender side and in receiver side, which is based on trusted third party.
新模型依据TTP(可信第三方)的结构来传递企业间的信任关系,增强了企业协作的自动化,减少了交互的成本。
The model was based on TTP architecture to achieve trust between enterprises and automation of enterprises' collaboration, and reduced the startup cost.
作者的主要研究成果如下:1。目前的匿名数字指纹要求可信任的第三方参与,这使得购买者的身份仍旧有可能被泄漏出去。
The main contributions are as follows. 1. The present anonymous digital fingerprinting schemes require a trusted third party taking part in, which makes the identity of buyer leaked out.
调停如果出现如39.01种所述的僵持,则双方应该参加由可信任的第三方主持的仲裁调节。
Mediation If an impasse is declared under Section 39.01, the parties will participate in non-binding mediation by a third-party mediator in good faith.
智力扑克是一种特定场景的安全多方计算,近些年来,学术界对智力扑克协议的研究基本都是基于可信第三方的。
Mental poker is a secure multi-party computation solution in specific scene. In recent years, the studies on mental poker protocol in academe are mainly based on Trusted Third party (TTP).
认证机构CA是PKI的核心执行机构,是PKI的主要组成部分,是一种权威性、可信任性和公正性的第三方机构。
CA is PKI's central executive organization, the main component of PKI, which is a third party representing authority, credibility and fairness.
应用推荐