• 目前为止,学术界对于基于门限密码入侵容忍研究几乎都集中门限rsa密码技术的应用上。

    Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.

    youdao

  • 最后基于本文提出椭圆曲线密码体制上的门限代理签名方案设计开发了一个电子审稿系统。

    Last, based on the above scheme, an electronic review system is designed and developed, which can reduce the workload of editors and increase the automation of review systems.

    youdao

  • 结合椭圆曲线密码体制、门限密码技术和签名方案该文提出了基于椭圆曲线可验证门限盲签名方案。

    This paper presents a new verifiable threshold blind signature scheme based on the elliptic curve by adopting threshold cryptography and blind signature scheme.

    youdao

  • 结合椭圆曲线密码体制、门限密码技术签名方案该文提出了一种基于椭圆曲线可验证的门限签名方案。

    This paper proposes a threshold multi-proxy blind multi-signature scheme based on elliptic curve by adopting threshold cryptography and blind signature scheme.

    youdao

  • 一种基于双线性对的新型门限代理签名方案进行了密码分析,发现门限代理签名方案不能抵抗伪造攻击公钥替换攻击。

    Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks.

    youdao

  • 目前门限代理签名方案几乎基于离散对数问题的,基于RSA密码体制的门限代理签名方案几乎很少

    The proposed threshold proxy signature schemes have been based on the discrete logarithm problem, and there are few RSA-based schemes.

    youdao

  • 目前门限代理签名方案几乎基于离散对数问题的,基于RSA密码体制的门限代理签名方案几乎很少

    The proposed threshold proxy signature schemes have been based on the discrete logarithm problem, and there are few RSA-based schemes.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定