• Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.

    公钥-私组合公共密钥基础设施核心建立非对称密码的基础

    youdao

  • The symmetric key itself is encrypted by one or more asymmetric keys (public keys).

    这个对称本身一个多个对称密匙(公共密匙)加密。

    youdao

  • Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).

    不对称加密公钥加密(两个术语同义词)。

    youdao

  • An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.

    对称算法使用不同密钥消息进行加密解密;其中个秘必须秘密的,一个密钥通常是公开的。

    youdao

  • The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.

    传递数据使用公钥(非对称)加密算法加密所以只有对应持有者才能解密数据。

    youdao

  • An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.

    对称密钥(公钥)算法用于交换对称算法中使用加密密钥以及用于数字签名

    youdao

  • The asymmetric algorithm USES the public key in the server's digital certificate.

    对称算法将使用服务器数字证书中的公钥

    youdao

  • The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.

    用于数据加密密钥使用带有与服务提供者(Service Provider)的 X.509 证书相关联公钥对称算法进行加密的。

    youdao

  • Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).

    使用不对称加密public/private密钥对进行消息签名加密简单的(至少概念上很简单)。

    youdao

  • The public key cryptosystem or the asymmetric cryptosystem is an important way to implement and ensure information security.

    公开密码系统对称密码系统实现保障信息安全的一种重要方式

    youdao

  • Asymmetric cryptographic algorithms, also known as public-key algorithms, require that each entity maintains a pair of related keys: a private key and a public key.

    不对称加密算法(称为公钥算法)要求每个实体都维护一对相关密钥公钥

    youdao

  • However, in many applications it needs an asymmetric scheme, where a private key is used for watermark embedding, and a public key is used for watermark detection.

    许多实际的应用要求对称的数字水印方案,即水印嵌入使用私人密钥,水印检测时只需要一个公开密钥。

    youdao

  • Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.

    利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。

    youdao

  • A new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.

    基于非对称公钥叛逆者追踪方案给出了新的电子软件销售产权保护模型,适用于一类需要安装运行的软件。

    youdao

  • By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    利用RS两锁密码协议构造一种非对称公钥叛逆者追踪方案。

    youdao

  • Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.

    公钥对称公钥密码学使用一对密钥,其中个定义加密存放另外一个称为公钥,通常无须加密。

    youdao

  • The two main competing cryptography schemes are known as the secret-key (symmetric) system and the public-key (asymmetric) system.

    现有两种主要的、相互竞争着的密码术,称作钥(即对称系统钥(即不对称)系统。

    youdao

  • Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.

    非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关公钥个私

    youdao

  • Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.

    非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关公钥个私

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定