Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.
公钥-私钥组合是公共密钥基础设施的核心,建立在非对称密码的基础上。
The symmetric key itself is encrypted by one or more asymmetric keys (public keys).
这个对称密匙本身又由一个或多个非对称密匙(公共密匙)加密。
Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).
不对称加密:公钥加密(这两个术语是同义词)。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.
传递的数据使用公钥(非对称)加密算法加密,所以只有对应私钥的持有者才能解密数据。
An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.
对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
The asymmetric algorithm USES the public key in the server's digital certificate.
对称算法将使用服务器的数字证书中的公钥。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).
使用不对称加密和public/private密钥对进行消息的签名和加密是很简单的(至少概念上很简单)。
The public key cryptosystem or the asymmetric cryptosystem is an important way to implement and ensure information security.
公开钥密码系统或非对称密码系统是实现和保障信息安全的一种重要方式。
Asymmetric cryptographic algorithms, also known as public-key algorithms, require that each entity maintains a pair of related keys: a private key and a public key.
不对称加密算法(也称为公钥算法)要求每个实体都维护一对相关密钥:私钥和公钥。
However, in many applications it needs an asymmetric scheme, where a private key is used for watermark embedding, and a public key is used for watermark detection.
而许多实际的应用都要求非对称的数字水印方案,即水印嵌入时使用私人密钥,水印检测时只需要一个公开密钥。
Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.
利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。
A new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.
基于一种非对称公钥叛逆者追踪方案给出了新的电子软件销售和产权保护模型,适用于一类需要安装运行的软件。
By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.
利用RS码和两锁密码协议构造了一种非对称的公钥叛逆者追踪方案。
Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.
公钥和非对称公钥密码学使用一对密钥,其中的一个定义为私钥并加密存放,另外一个被称为公钥,通常无须加密。
The two main competing cryptography schemes are known as the secret-key (symmetric) system and the public-key (asymmetric) system.
现有两种主要的、相互竞争着的密码术,被称作秘钥(即对称)系统和明钥(即不对称)系统。
Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
应用推荐