• With the application of symmetric cipher and asymmetric cipher, a cryptographic key management scheme for hierarchy is presented and a workgroup cryptographic key management scheme is presented.

    结合单钥加密双钥加密理论,分别给出了纵向的等级安全管理密钥管理方法横向的协同工作安全管理的工作组密钥管理方法。

    youdao

  • By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    利用RS两锁密码协议构造一种非对称公钥叛逆者追踪方案。

    youdao

  • By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    利用RS两锁密码协议构造一种非对称公钥叛逆者追踪方案。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定