您要查找的是不是:
- The first scheme emploies the theory of threshold secret sharing and the idea of two level hierachical method. 第一个方案应用门限秘密共享理论和两级分层分组组播的思想。
- Based on the clustering of the networks,we propose a distributed key management scheme using the publicly verifiable threshold secret sharing. 本文在将网络进行分簇的基础上,利用可公开验证的门限秘密共享体制,给出了一种分布式的密钥管理方案。
- Aiming at implementing secret sharing in RFID tags group,this paper proposes a verifiable threshold secret sharing scheme,which is fit for RFID system,and analyzes its security features. 该文针对如何在RFID标签组中实现秘密共享的问题,提出适用于RFID系统的可验证门限秘密共享方案,对其进行安全性分析。
- threshold secret sharing mechanism 门限密钥共享机制
- special threshold secret sharing 特殊门限秘密共享
- Mignotte' s threshold secret sharing scheme Mignotte’s门限秘密共享方案
- Threshold secret sharing scheme based on ECC and its security 基于ECC的门限秘密共享方案及其安全性
- A New Dynamic Threshold Secret Sharing Scheme to Identify Cheaters 一个新的防欺诈动态门限秘密分享方案
- Design to Identify Cheaters in the Threshold Secret Sharing Scheme 门限秘密共享体制的一种防欺诈设计
- Publicly Verifiable Secret Redistribution for Threshold Secret Sharing Scheme 公开可验证的秘密重新分配门限方案
- Threshold secret sharing scheme based on difference of special access right 基于差分的特殊权限下(m+n,t_1+t_2)门限秘密共享
- Generalized threshold secret sharing scheme among weighted participants of special access right 特殊权限下权重不同参与者的广义门限方案
- The idea and way of secret sharing, threshold schemes, multisecret sharing. 秘密共享的思想和方法,门限方案、(多)秘密共享。
- threshold secret sharing 门限秘密共享
- threshold secret sharing scheme 门限秘密共享
- Multi-party Secret Sharing of Quantum Information in Cavity QED[J]. 引用该论文 李松梅;姜雪洁;张寿.
- A new threshold proxy signature scheme with known signers based on bilinear pairings theory is proposed using the technique of verifiable secret sharing. 摘要利用双线性对理论和可验证的秘密分享技术,提出了一种新的具有已知签名者的门限代理签名方案。
- A secure elliptic curve, combined threshold scheme, verifiable secret share scheme with proactive secret share scheme is selected to make sure security requirement. 本文基于安全的椭圆曲线,结合门限体制、可验证秘密共享体制以及主动秘密共享方案,给出一种新的入侵容忍签字方案。
- A new authentication scheme named Virtual Enterprise Certificate Authority (VECA) is proposed, in which the technologies of secret sharing, threshold signature and dynamic Public Key Infrastructure (PKI) are employed. 结合秘密分享、门限签名和动态PKI的思想,提出了基于虚拟企业认证中心(VECA)的签名和认证方案。
- What is the secret shared by Aramis and Madame de Chevreuse? 据说戛纳附近的岛上监狱的确关过一个头带铁面罩的神秘囚犯,至于他是否真是国王的孪生兄弟,后来又被偷梁换柱救了出去,那些都是无据可考的离奇传说。