提出两个抗选择密文攻击的门限密码系统。
Two threshold cryptosystems secure against chosen ciphertext attacks are proposed.
门限密码学提供了一种安全的密钥共享方法。
Threshold cryptography provides a way in which the secret key can be shared secretly.
将组合公钥技术和门限密码理论结合应用于移动自组网的密钥管理方案中。
Combined public key and threshold cryptography are applied to key management for Mobile Ad Hoc Network (MANET) in this paper.
分布式乘法计算是安全多方计算中的重要部分,也是设计门限密码体制的基本协议。
Distributed multiplication computation is an important part of secure multi-party computation and a basic protocol of threshold cryptography.
仿真结果表明该方案在平均签名时间和签名验证成功率上要优于传统的门限密码体制。
Simulation results demonstrate that it is better than traditional threshold cryptosystem with respect to the average signature of time and successful signature rate.
分布式乘法计算是构造门限密码体制的基本模块,同时也是安全多方计算领域的重要研究内容。
They are basic modules to construct threshold cryptosystems, and also important components of secure multiparty computation.
到目前为止,学术界对于基于门限密码学的入侵容忍研究几乎都集中在门限rsa密码技术的应用上。
Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.
结合椭圆曲线密码体制、门限密码技术和盲签名方案,该文提出了一种基于椭圆曲线可验证的门限盲签名方案。
This paper presents a new verifiable threshold blind signature scheme based on the elliptic curve by adopting threshold cryptography and blind signature scheme.
结合椭圆曲线密码体制、门限密码技术和盲签名方案,该文提出了一种基于椭圆曲线可验证的门限盲签名方案。
This paper proposes a threshold multi-proxy blind multi-signature scheme based on elliptic curve by adopting threshold cryptography and blind signature scheme.
最后,基于本文提出的椭圆曲线密码体制上的门限代理签名方案,设计开发了一个电子审稿系统。
Last, based on the above scheme, an electronic review system is designed and developed, which can reduce the workload of editors and increase the automation of review systems.
它们来源于密码学中的门限方案的研究。
对一种基于双线性对的新型门限代理签名方案进行了密码分析,发现该门限代理签名方案不能抵抗伪造攻击和公钥替换攻击。
Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks.
目前的门限代理签名方案几乎都是基于离散对数问题的,基于RSA密码体制的门限代理签名方案几乎很少。
The proposed threshold proxy signature schemes have been based on the discrete logarithm problem, and there are few RSA-based schemes.
目前的门限代理签名方案几乎都是基于离散对数问题的,基于RSA密码体制的门限代理签名方案几乎很少。
The proposed threshold proxy signature schemes have been based on the discrete logarithm problem, and there are few RSA-based schemes.
应用推荐