The only way to guarantee that the public key signature is from the owner is for the owner to hand you the key on a disk, in person. 保证公共密钥签名来自所有者的惟一方法是,密钥的所有者亲自把磁盘上的密钥交给您。
A signed public key has a digital signature ( quite analogous to a human signature) that states that the signer vouches for the public key. 签名公钥有数字签名(非常类似于人工签名)来表明签署者对公钥的担保。
Since most of the known multivariate public key signature schemes are under attacks, an improved signature model is proposed by analyzing the structure of the classical model. 针对目前已知的大多数多变量公钥签名方案都处于攻击之下的事实,对多变量公钥签名的一般模型进行分析,提出一种改进结构。
Signature property verifies using the public key in the signature. 属性是否使用签名中的公钥进行验证。
An efficient self-certified public key signature from bilinear pairings 高效的使用双线性对的自认证公钥签名
At the same time, the lengths of key and signature were unrelated to the number of group members. 同时,密钥的长度及签名的长度与群成员的多少无关。
This paper proposed an efficient ID-based signature scheme without trusted party against the problem of key escrow of ID-based signature system. 针对现有的基于身份签名系统的密钥托管问题,提出了一种高效的基于身份的无可信中心签名方案。
The client invokes the signer in "verify" mode and passes the digest, the signature, and the public key to verify the signature. 客户机以“验证”方式调用签名引擎,并传递摘要、签名和公钥来验证签名。
In digital signatures, the private key generates the signature, and the corresponding public key validates the signature. 在数字签名中,私钥将生成签名,而相应的公钥将验证该签名。
A tonal system consisting of seven tones in fixed relationship to a tonic, having a characteristic key signature and being since the Renaissance the structural foundation of the bulk of Western music; tonality. 调、主音包括七个与主音有固定关系的音色的调音系统,有独特的调号,自文艺复兴以来一直是西方音乐主体的结构基础;调性。
The wave motion bears the Key signature imparted by the nature and extent of the source. The Dynamic Action of Coupled Waves in Lossy Nonlinear Medium 波动具有由震源的性质和范围造成的主要特征。有耗非线性介质中耦合波的动力学行为
In this paper, an efficient self-certified public key signature scheme was proposed by using bilinear pairings. 为此使用双线性对,构造了一种高效的自认证公钥签名方案。
The other is modifying public key signature main mode to protect the initiator's identity. 对公钥签名主模式进行改进,以保护发起者的身份信息。
The third party uses the message, the key signature and the known public key to verify the source as trusted. 第三方再根据该讯息、金钥签章与已知的公开金钥,认证该讯息具有可信赖的来源。
This is because the key signature contains a hash of the file, and modifying the file renders the hash invalid. 这是因为,该密钥签名包含该文件的哈希,修改该文件会呈现无效的哈希。
The Implement of A Pair of Secret Key of Digital Signature Algorithm by Using Java Programming Language 用JAVA实现DSA数字签名算法的密钥对
If the proxy signer wans to use the same proxy key to signature different messages, his private key will be cracked. 如果代理人两次用同一代理密钥签名,他的私钥就会被破译。
In this paper, the characteristics and key problems of signature management are analyzed in detail. Referring to WFMC workflow frame structure, a signature management system realization scheme based on workflow is designed. 本文对签字管理的特点和要解决的关键问题进行了详细分析,并参照WFMC工作流的框架结构设计了一种基于工作流的签字管理系统实现方案。
According to the elliptic curve cryptography theory and digital watermarking technique, this paper presents the concepts of secret key and signature watermarking. 根据椭圆曲线加密理论和数字水印技术,给出密钥和签署水印密钥的概念;
Common proxy signature has a serious defect: once key for signature disclosed, document signed by former key for signature is invalid. 普通的代理签名算法有一个严重的缺陷:一旦签名密钥泄露,以前用该密钥签名的所有文档都失效。
On the basis of a NP ─ completeness problem ( matrix cover problem), a new type of public key signature scheme is presented. Its velocity is quicker and its realization is easier. and discusses its safety character. 以NP完全问题MatrixCover问题为基础,建立了一公钥签名体制.该体制速度快,易实现,并对其安全性进行了讨论。
In the new scheme, the digital signature can not be denied or forged, and the secret key update algorithm is fast, and the sizes of key and signature are small. 新方案具有签名的不可伪造性和不可否认性、密钥进化快、签名和密钥长度短等特点。
The new IBS scheme, not increasing any public key parameter and signature ciphertext overload, will improve the security reduction efficiency by modifying the parameters of Waters identity function which is used to deal with message, so it is more secure and credible. 新方案在不增加任何公钥参数和签名通信量的条件下,通过修改处理消息的Waters身份处理函数的参数设置使得新算法的安全归约效率得到了较大提高,因而新方案也更为安全可信。
Combing signature technology and bilinear maps technology, the problem of completely trusting of private key generator is solved. Not only the fault, user denies signatures, is preventing and the disfigurement, private key generator forges signature, is eliminated. 结合签名技术,双线性映射技术,解决了密钥生成中心完全可信的问题,既防止用户否认签名,又避免了密钥生成中心伪造签名。
In this protocol, the evidence problem based on reliable client is pointed out. Without public key signature algorithm, the evidence problem is solved by symmetric cipher and hash function. 该协议提出了基于客户端可信的证据保留问题,并在不使用公钥数字签名算法的前提下,利用哈希函数与对称密码算法解决了证据保留问题。
The second algorithm is similar to the first. The software we made with VC++ 6.0 uses minimal steps to complete key generation, signature and verification. 类似签名算法一,我们又提出了签名算法二,并用VC++6.0软件实现了其密钥生成、签名和验证的过程。
The CGA extension header comprehends four kinds of options, which are used to bind the content of packet, source address, public key, private key and signature. 该扩展头包含四种选项,用于数据包内容、源地址、公钥、私钥和签名的绑定。
In forward-secure signature scheme, the operation is divided into time periods, with a different secret key for each time period. Each secret key is used to sign messages only during a particular time-period, while the public key for verifying signature remains unchanged. 在前向安全数字签名中,签名的有效时间被分成若干个周期,在每个周期内使用不同的私钥产生签名,而验证签名的公钥在整个有效时间内保持不变。
One-way Hash function is a key of digital signature, can greatly shorten the signature time, and has a wide range of applications in the message integrity testing and message authentication. 单向Hash函数是数字签名中的一个关键环节,可以大大缩短签名时间,在消息完整性检测以及消息认证等方面有着广泛的应用。