• The master private key is Shared by the private key of every node. Threshold and identity-based key management and authentication are used.

    节点使用其身份作为公钥,密钥各节点分享,从而形成基于身份的门限分布式密钥管理

    youdao

  • An SSH-based identity consists of two parts: a public key and a private key.

    个基于ssh身份包括两个部分个公钥一个私钥。

    youdao

  • One of the key advantages of DSig-based protocols is the ability to both assert identity and create a tamper-proof envelope of the content of the message which are often both required together.

    基于DSig协议有个很主要的优势——断定身份的同时还创建消息内容的防篡改信封两个功能通常要求同时出现。

    youdao

  • To guarantee the system safe, this thesis designed a new kind of Identity certification method based on the mode of keywords and public-key certification.

    为了保证系统安全性论文结合基于口令公钥认证模式设计了一种新型身份认证方法

    youdao

  • Combined with complete binary tree architecture, a new identity-based group key agreement protocol is proposed in this paper.

    文中结合完全二叉结构提出一种新的基于身份密钥协商协议

    youdao

  • On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.

    研究基于RS A密钥算法智能卡认证技术基础上提出了基于散列函数的智能卡访问认证方法

    youdao

  • Since the appearance of certificate-based public key systems, much attention has been paid to identity-based public key cryptosystems to decrease the cost of certificates management.

    为了减少证书管理开销,基于身份公钥密码体制在基于证书的公钥密码体制诞生后出现,并且越来越受到关注

    youdao

  • Therefore constructing identity-based public key architecture has become a new approach to solve secure Email problem.

    构造基于身份的公钥系统成为解决电子邮件安全问题的一种新的途径

    youdao

  • There are three authentication systems now: Public Key Infrastructure (PKI), Identity-Based Encryption (IBE) and Combined Public Key (CPK).

    现今三种认证系统公钥基础设施(PKI)、基于标识加密系统(IBE)组合公钥系统(CPK)。

    youdao

  • This paper presents an identity-based authenticated key exchange protocol in the standard model.

    提出一个标准模型下基于身份认证密钥协商协议

    youdao

  • It can provide high strength (with key of 256bits) encryption, integrality validation, identity authentication based on PKI, and anti-replay protection for upper layer application.

    可以提供256强度数据加密完整性验证基于PKI身份认证以及重播保护功能,最大限度地上层应用提供安全保护。

    youdao

  • The current proxy blind signature are based on the identity or certificate, needing reliable third-party authentication. Public key system without the certificate has to overcome this shortcoming.

    当前代理签名都是基于身份证书的,需要可靠第三方认证无证书公钥系统克服这种缺点

    youdao

  • This paper states all kinds of technologies on secure Email, analyses current popular secure Email system built on certificate-based public key architecture and introduces identity-based cryptosystem.

    本文详细陈述了安全电子邮件的各项技术,并对当前主流基于证书公钥密码体系的安全电子邮件系统进行分析引入了基于身份的密码系统。

    youdao

  • In this paper, we propose a novel secure multicast scheme with key agreement based on Elliptic Curve Cryptosystem and group communication inside Identity-based Public key Cryptography system.

    提出一个应用椭圆曲线密码体制进行密钥协商在基于身份的公钥系统进行通信全新安全组播方案

    youdao

  • The IBE-based identity authentication scheme, which is without the need for issuing digital certificates to bind user identity and public key, can improve the certification efficiency.

    基于IBE的身份认证方案无需通过颁发数字证书绑定用户身份公钥可以提高认证效率。

    youdao

  • In order to eliminate the use of certificates in traditional proxy signature and the key-escrow problem in identity-based proxy signature, the notion of certificateless proxy signature was introduced.

    证书代理签名方案保留基于身份的代理签名不需要证书优点下,成功地解决基于身份的代理签名方案中的密钥托管问题。

    youdao

  • In order to eliminate the use of certificates in traditional proxy signature and the key-escrow problem in identity-based proxy signature, the notion of certificateless proxy signature was introduced.

    证书代理签名方案保留基于身份的代理签名不需要证书优点下,成功地解决基于身份的代理签名方案中的密钥托管问题。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定