The security proof of the first scheme is based on the disperse logarithm problem (DLP);
一种方案的安全性证明是基于离散对数问题;
Lastly, under the DDH assumption, the detailed security proof of NLWZ protocol is presented.
最后,在DDH假设下,给出了改进协议(NLWZ协议)的安全性证明。
The security proof in the standard model ensures that the security of protocol in the real application to meet higher security requirements.
标准模型下的安全性证明能保证协议在实际应用中的安全性,满足更高的安全要求。
Under this definition, we design a concurrent equivocal commitment scheme and give a security proof. Our scheme is based on one-way function families.
我们设计出一个基于单向函数簇的并发歧义承诺方案,并进行了安全性证明。
Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.
并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。
Your suspicions are aroused, but as a security analyst, you can't go around pointing fingers without proof.
您产生了怀疑,但作为一名安全分析师,您不能在没有证据的情况下到处指证。
Kerberos is a security authentication protocol that requires users and services to provide proof of identity.
Kerberos是需要用户和服务提供标示证明的安全性认证协议。
One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).
演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
A web of security cameras, metal detectors, beam sensors and bullet-proof screens will reinforce security in the three-storey, 3, 000 square-metre building.
在这座三层楼高、3000多平米的建筑中,监视系统、金属探测器、光束传感器和防弹屏构成了一个网络,加强安全保卫。
Before everyone panics, let's get one thing clear: the new Twitter worm is only a proof-of-concept devised by computer security researchers at Secure Science - it is not out in the wild.
在所有人恐慌之前,澄清一件事:最新的Twitter蠕虫只是由SecureScience的计算机安全人员发明的理论上可行的概念,不是在野外的虫子。
Hardware security Module: dedicated security hardware for tamper proof storage and management of keys.
硬件安全组件:专业的方干扰存储器安全硬件和密钥管理。
As a future - proof high - speed backbone network technology, the security mechanism has to be integrated in ATM.
AT M作为未来高速网络的骨干技术,必须集成安全机制。
From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.
从一个实用系统出发,采用形式化的证明方法,分析了电子资金转帐系统中安全协议的保密性和可鉴别性。
Proof of the university teaching administration with perfect functions, security, good performance, running stable and other characteristics.
证明了该高校教学管理系统具有功能完善、安全性能好、运行稳定等特点。
The cryptographic protocol should always satisfy security properties, so the formal specification should give the corresponding proof method.
密码协议必须满足安全属性的需求,对密码协议进行形式化规范需要证明其满足该属性。
At the same time, same security level as RSA has can be achieved by ellipse curve-based zero knowledge proof with the key much shorter in length than that of RSA.
同时基于椭圆曲线上的零知识证明可以用比RSA短得多的密钥,达到与RS A同等级别的安全性。
Proved through practice, this system is featured for high stability, anti-sepsis, mould proof, lightning protection, low-consuming and low-cost, which ensures the storage security effectively.
实践证明,该系统具有稳定性高、防腐防霉防雷击、低功耗低成本等特点,能够有效保障粮食存储安全。
Finally, by setting up RSA digital signature of remote digital proof, the security of network transmission and validity of digital signature is assured.
最后,通过建立远程数码打样的RSA数字签名方案,保证了网络传输数据的安全性以及数字签名的有效性。
Objective to evaluate efficacy and acute toxicity of rhinitis capsules so as to provide a scientific proof of modern pharmacology and security for clinical work.
目的检测鼻炎胶囊的有效性和急性毒性反应,为临床提供现代药理学及安全用药的科学依据。
If America declines, who will serve as living proof that liberty, security and prosperity can all exist together?
如果美国衰退了,谁能担任这个自由、安定和繁荣能够共存的鲜活证据呢?
Absrtact: Zero - knowledge proof has been one of the key technologies to be applied in identity authentication in the fields of information security.
摘要:零知识证明已经成为信息安全领域身份认证的关键技术之一。
Fail-stop signature schemes provide security even if a forger possesses unlimited computation power by enabling the sender to provide a proof on forgery if it occurs.
失败-停止签名是一类不依赖于攻击者计算能力假设的数字签名技术,即使攻击者拥有无限的计算能力,签名者也可以证明一个签名是伪造的。
The safety distribution system for a residential district was presented, which includes technologies of shock proof, fire prevention, surge protection, electrical inspection and public security.
电气安全最受人们的重视和关注,包括防人身电击技术、防电气火灾技术、电涌防护技术、电气检修安全技术和保安技术等。
Stemming from system's factor and so on security considerations, before a system design, needs to carry on the plan and the technical proof.
出于系统的安全性等因素的考虑,一个系统设计之前,需要进行方案和技术论证。
Because of the special requirements of the bus security, this dissertation mainly discusses all types of bus quality disputes and the burden of proof of the parties.
车产品对安全方面的特殊要求,本文主要论述因客车质量引发的各类纠纷及其有关当事人应负的举证责任。
Many security enterprise successively started production explosion-proof type peacefully guards against the product.
许多安防企业先后开始生产防爆型安防产品。
This paper focus on the existing security risks and the common electrical failure of the flame-proof movable load center during the operation, and the solutions is analyzed and proposed.
本文针对矿井隔爆移动负荷中心运行过程中存在的安全隐患以及常见的电气故障进行分析并提出了解决措施。
Inspired by the birds, one man built a thief-proof house without alarms, electric fencing, or security beams in crime-ridden South Africa, host of the 2010 World Cup.
在犯罪猖獗的世界杯东道主南非,由于受到鸟类的启发,一个男子建造了一间可预防偷窃的房子,但是没有警报设施,没有电网,也没有安全梁。
Because massive small coal mine closure, causes the difficulty of mine water-proof to enlarge and threatens badly mine security.
大量小煤矿关闭后形成的积水,使得水害治理难度加大,严重威胁着矿井安全。
Because massive small coal mine closure, causes the difficulty of mine water-proof to enlarge and threatens badly mine security.
大量小煤矿关闭后形成的积水,使得水害治理难度加大,严重威胁着矿井安全。
应用推荐