到目前为止,学术界对于基于门限密码学的入侵容忍研究几乎都集中在门限rsa密码技术的应用上。
Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.
最后,基于本文提出的椭圆曲线密码体制上的门限代理签名方案,设计开发了一个电子审稿系统。
Last, based on the above scheme, an electronic review system is designed and developed, which can reduce the workload of editors and increase the automation of review systems.
结合椭圆曲线密码体制、门限密码技术和盲签名方案,该文提出了一种基于椭圆曲线可验证的门限盲签名方案。
This paper presents a new verifiable threshold blind signature scheme based on the elliptic curve by adopting threshold cryptography and blind signature scheme.
结合椭圆曲线密码体制、门限密码技术和盲签名方案,该文提出了一种基于椭圆曲线可验证的门限盲签名方案。
This paper proposes a threshold multi-proxy blind multi-signature scheme based on elliptic curve by adopting threshold cryptography and blind signature scheme.
对一种基于双线性对的新型门限代理签名方案进行了密码分析,发现该门限代理签名方案不能抵抗伪造攻击和公钥替换攻击。
Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks.
目前的门限代理签名方案几乎都是基于离散对数问题的,基于RSA密码体制的门限代理签名方案几乎很少。
The proposed threshold proxy signature schemes have been based on the discrete logarithm problem, and there are few RSA-based schemes.
目前的门限代理签名方案几乎都是基于离散对数问题的,基于RSA密码体制的门限代理签名方案几乎很少。
The proposed threshold proxy signature schemes have been based on the discrete logarithm problem, and there are few RSA-based schemes.
应用推荐