文献【5】提出了一种 基于门限密码(TC,threshold cryptography)[61的分布 式PKI框架,CA由拜个服务器共同担当,私钥被 分成n片,每个服务器拥有l片,只有当t...
基于4个网页-相关网页
到目前为止,学术界对于基于门限密码学的入侵容忍研究几乎都集中在门限rsa密码技术的应用上。
Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.
最后,基于本文提出的椭圆曲线密码体制上的门限代理签名方案,设计开发了一个电子审稿系统。
Last, based on the above scheme, an electronic review system is designed and developed, which can reduce the workload of editors and increase the automation of review systems.
结合椭圆曲线密码体制、门限密码技术和盲签名方案,该文提出了一种基于椭圆曲线可验证的门限盲签名方案。
This paper presents a new verifiable threshold blind signature scheme based on the elliptic curve by adopting threshold cryptography and blind signature scheme.
应用推荐