1) semi-trusted center
半可信中心
1.
This article provides a mutual non-repudiation exchange protocol based on semi-trusted center and, the center dynamically produces time-marking, identifies the sender.
文章提出了一种基于半可信中心的双方不可否认协议,由半可信中心来动态产生时间标记,并对发送方身份进行验证,但不对通信双方的消息进行验证,很好地解决了电子商务系统性能的瓶颈—可信中心的计算能力、重放攻击威胁、通信双方密码泄漏造成的重建维护等问题。
2) trusted party
可信中心
1.
A directed threshold signature scheme without a trusted party;
一个无可信中心的有向门限签名方案
2.
Two forgery attacks and their corresponding conspiracy attacks are proposed against the(t,n) threshold signature scheme without a trusted party worked out by Wang Bin and Li Jian-hua(the WL Scheme for short).
针对王斌和李建华的无可信中心(t,n)门限签名方案(简称王-李方案),给出两种伪造签名攻击及相应的合谋攻击。
3.
A digital watermarking for relational databases algorithm which was based on secret sharing with a trusted party was proposed.
根据关系数据库的特殊性,结合现有数字水印技术,将可信中心和密钥分存的思想引入关系数据库水印算法。
3) trusted center
可信中心
1.
In order to meet the requirements of digital signature for messages with different importance,a secret sharing-multisignature scheme without a trusted center is proposed based on the techniques of joint random secret sharing and multisignature.
为满足多等级数字签名的需要,采用联合随机秘密共享技术和多重签名技术,设计了一种新的签名方案——无可信中心的秘密共享-多重签名方案。
2.
In this paper,a new secret-sharing multi-signature scheme without trusted center is analyzed,and a forged attack is given.
首先,对一种新的无可信中心的秘密共享-多重签名方案进行分析,并提出了一种伪造攻击;利用这种攻击,攻击者可以很容易地伪造有效的秘密共享-多重签名,从而证明了该方案是不安全的。
4) trusted authority
可信中心
1.
In this scheme,when an original signer finds that a proxy signer is malicious,he can revoke the malicious proxy signer s signing capability efficiently through a trusted authority.
当原始签名者发现代理签名者不诚实时,该体制可以通过可信中心有效地撤销代理签名者的签名权。
5) trusted dealer
可信中心
1.
New identity based Chameleon threshold signature without trusted dealer;
一种无可信中心的基于身份的卡梅隆门限签名
2.
Usually there is no such an authority which can be trusted by everyone,so the scheme is more attractive than the ones with a trusted dealer.
文章基于双线性对提出了一种新的无可信中心的门限签名体制。
6) without trusted center
无可信中心
1.
In this paper, we propose a new (t, n) threshold signature scheme without trusted center based on discrete logarithm.
本文基于离散对数问题提出了一个无可信中心的(t,n)门限签名方案。
2.
This paper proposes a threshold authentication scheme without trusted center’s participation.
提出了一种在无可信中心的情况下由组中成员共同颁发证书的安全门限身份认证方案。
补充资料:可信区间
可信区间
是以上、下可信限为界的一个范围。是按一定的概率估计总体参数的可能范围。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条