...门限加密;自适应安全性 [gap=1613]: digital signature; group signature; identitybased signature; knowledge proof; threshold encryption; adaptive security...
基于20个网页-相关网页
threshold signature encryption 门限签密
threshold ElGamal encryption 门限ElGamal加密
ID-based threshold broadcast encryption 基于身份的门限广播加密
However, database encryption has a relatively high technical threshold for the majority of users, and even information security practitioners are more mysterious.
但是数据库加密具有相对较高的技术门槛,对于广大用户、甚至是信息安全从业人员来说都比较神秘。
Based on proxy signature and convertible authenticated encryption scheme, Ren et al. (2005) proposed proxy convertible authenticated encryption and threshold proxy signature scheme.
基于代理签名与可转换认证加密方案,任等(2005)提出了一种代理可转换认证加密和门限代理签名方案。
应用推荐