I suppose these changes are deniable? ie We might convince others they are not true. 我想这些更动可以驳回吧?
A deniable authentication protocol is proposed in this paper. 提出了一种新的可否认的认证协议。
Deniable Authentication Protocol Based on Public Key Algorithm 基于公开密钥算法的可否认认证协议
So it is not deniable that there are some problems in the contests of the textbook and course offered. 所以不能否认体育课程内容、课程设置存在一定问题。
At the end of the paper, two efficient deniable authentication protocols are presented on the basis of Aumann and Rabin's scheme. 文章同时在Aumann和Rabin的可否认认证协议的基础上提出了两个可否认认证协议,两个协议与原方案相比效率得到了较大的改进。
A Digital Signature Method Deniable by neither Sender nor Receiver So it is not deniable that there are some problems in the contests of the textbook and course offered. 一种收、发双方均不可否认的数字签名方案所以不能否认体育课程内容、课程设置存在一定问题。
A Chaos-based Scheme for Deniable Authentication 一个基于混沌理论的可否认认证方案
With the effect of cultural critical theory of Frankfurt School, the scholars mainly take a skeptical, disdainful and deniable attitude to the early mass culture in China. 受法兰克福学派文化批判理论影响,对早期的中国大众文化,学者们多持怀疑、轻蔑、否定态度。
Deniable authentication scheme for secret communication 用在秘密通信中的可拒绝认证方案
Based on a chaotic encryption-hash algorithm with parallel property and RSA algorithm with exchange property, we propose a secure and efficient scheme for the deniable authentication. 利用一种混沌加密散列算法的并行特性和RSA算法的交换特性,设计了一个安全高效的可否认认证方案。
Deniable ring signature scheme is another ring signature except that it can restrict "excessive" anonymity. 可否认环签名是另外一种防止匿名性滥用的环签名方案。
Then proposed a deniable model based on Blanchet calculus. 然后基于Blanchet演算,提出一个支持CryptoVerif的可否认性证明模型。
Deniability has received significant attention. Deniability has a lot of applications to construction of deniable authentication protocol, deniable group key agreement and deniable encryption scheme. 可否认性已经引起了很大的关注,在认证协议、组密钥协议以及加密方案中得到了广泛应用。
Deniable encryption is cryptosystem that allows a user ( a sender and/ or a receiver of messages) to deny the real parameters of encryption algorithms, and to provide fake parameters. But coercive adversary could not know the fraud. 可否认的加密是一种加密体制,允许用户(消息的发送者或接收者)否认在加密过程中所使用的真实参数,而给出一个假的参数,但是,强迫攻击者不能觉察出这种欺骗。
To sum up, the researches can be concluded as follows. 1. The notions of Weaken Key-Compromise Impersonation ( W-KCI) Security and W-KCI Attack in non-interactive deniable authentication protocols are proposed. 归纳起来,本文的工作主要包括以下几个方面:1.提出非交互式可否认认证协议中的弱化的密钥泄露模仿安全性(WeakenKey-CompromiseImpersonation,W-KCI)以及W-KCI攻击两个概念。
Based on the research, some non-interactive deniable authentication protocols which have different attributes are proposed to apply in the field of negotiation through e-mail and electronic voting. 本文深入地研究了可否认认证协议及其相关理论的特征和应用,在此基础上,针对电子邮件协商和电子投票等应用领域设计了多个拥有不同属性的非交互式可否认认证协议。
To resist the W-KCI Attack, an identity-based deniable authentication protocol from bilinear pairing is proposed. 为了抵御提出的W-KCI攻击,本文提出一种基于身份的可否认认证协议。
This dissertation intensively analyzes the present researches and proposes the notions of W-KCI Security and W-KCI Attack in non-interactive deniable authentication protocols. 2. 本文深入分析了现有的研究成果,并针对非交互式可否认认证领域提出了W-KCI安全性和W-KCI攻击的概念。
This paper introduces a probability model based on a kind of probabilistic polynomial-time process calculus: Blanchet calculus. Analyze and prove the deniability of deniable authentication protocol using this process calculus. 本文引入一种基于计算模型的概率进程演算:Blanchet演算,对可否认认证协议中的可否认性进行了分析与证明。
A deniable proxy-anonymous signature scheme and an identity-based deniable authentication protocol for secret communication are proposed. 提出一种基于匿名代理的可否认认证方案和一种基于身份的用于秘密信息传输的代理可否认认证协议。
Deniable Ring Signature Scheme of Sub-linear Size. 次线性长度的可否认环签名方案。
A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender. 可否认的认证协议能够使得接收者确定给定消息的来源,但是不能向第三方证明发送者的身份。
Apply this model to the proof of Fan et al deniable authentication protocol. ( 3) Based on elliptic curve discrete logarithm problem; present a non-interactive deniable authentication protocol. 采用此模型,对Fan等人提出的可否认认证协议的可否认性进行了分析和证明。(3)基于椭圆曲线的离散对数困难问题,提出一个非交互式可否认认证协议。
The new protocol has solved two more outstanding problems in the wireless network: the active identity protection to the initiator and the peers can not deniable for the interaction between them. 新的协议解决了无线网络中比较突出的两个问题:对发起者的主动身份保护和不可否认性。