• 提出两个抗选择密文攻击门限密码系统

    Two threshold cryptosystems secure against chosen ciphertext attacks are proposed.

    youdao

  • 门限密码提供了一种安全密钥共享方法

    Threshold cryptography provides a way in which the secret key can be shared secretly.

    youdao

  • 组合公钥技术门限密码理论结合应用移动自组网的密钥管理方案中。

    Combined public key and threshold cryptography are applied to key management for Mobile Ad Hoc Network (MANET) in this paper.

    youdao

  • 分布式乘法计算安全多方计算中的重要部分,也是设计门限密码体制基本协议

    Distributed multiplication computation is an important part of secure multi-party computation and a basic protocol of threshold cryptography.

    youdao

  • 仿真结果表明该方案平均签名时间签名验证成功率上要优于传统门限密码体制。

    Simulation results demonstrate that it is better than traditional threshold cryptosystem with respect to the average signature of time and successful signature rate.

    youdao

  • 分布式乘法计算构造门限密码体制基本模块,同时也是安全多方计算领域的重要研究内容

    They are basic modules to construct threshold cryptosystems, and also important components of secure multiparty computation.

    youdao

  • 目前为止,学术界对于基于门限密码入侵容忍研究几乎都集中门限rsa密码技术的应用上。

    Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.

    youdao

  • 结合椭圆曲线密码体制、门限密码技术和签名方案该文提出了种基于椭圆曲线可验证门限盲签名方案。

    This paper presents a new verifiable threshold blind signature scheme based on the elliptic curve by adopting threshold cryptography and blind signature scheme.

    youdao

  • 结合椭圆曲线密码体制、门限密码技术签名方案该文提出了一种基于椭圆曲线可验证的门限签名方案。

    This paper proposes a threshold multi-proxy blind multi-signature scheme based on elliptic curve by adopting threshold cryptography and blind signature scheme.

    youdao

  • 最后,基于本文提出椭圆曲线密码体制上的门限代理签名方案设计开发了一个电子审稿系统。

    Last, based on the above scheme, an electronic review system is designed and developed, which can reduce the workload of editors and increase the automation of review systems.

    youdao

  • 它们来源于密码学中的门限方案的研究。

    They can be used to construct threshold schemes.

    youdao

  • 一种基于双线性对的新型门限代理签名方案进行了密码分析,发现门限代理签名方案不能抵抗伪造攻击公钥替换攻击。

    Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks.

    youdao

  • 目前门限代理签名方案几乎基于离散对数问题的,基于RSA密码体制的门限代理签名方案几乎很少

    The proposed threshold proxy signature schemes have been based on the discrete logarithm problem, and there are few RSA-based schemes.

    youdao

  • 目前门限代理签名方案几乎基于离散对数问题的,基于RSA密码体制的门限代理签名方案几乎很少

    The proposed threshold proxy signature schemes have been based on the discrete logarithm problem, and there are few RSA-based schemes.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定