proof scheme

英 [pruːf skiːm] 美 [pruːf skiːm]

网络  验证方案

计算机



双语例句

  1. A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.
    基于完全零知识交互证明系统和位委托方案,提出了可证明的安全水印认证协议。
  2. Was asked for proof of his identity; an employment history that was proof of her dependability. The scheme is robust, reliable and works real-time for the high-speed communication network.
    要求证实他的身份;工作经历便可证实她的可靠性采用该方案可以满足纵联保护装置对通信的实时性、靠性的要求。
  3. With the development of the theory of provable security, the MACs, which have security proof, are the first choice of many people. A Provably Secure Proxy Signature Scheme
    随着可证明安全理论的逐渐成熟,具备可证明安全的消息认证码无疑成为人们的首选.一个可证明安全的代理签名方案
  4. A detailed black-box simulator for the security proof of the proposed scheme is also given.
    对于这个方案给出详细的基于黑盒模拟的安全性证明。
  5. Applying the proof of knowledge of a double discrete logarithm based on ECC and the publicly verifiable distributed key generation protocol, threshold proxy blind signature scheme based on ECC and publicly verifiable distributed proxy blind signature scheme are given.
    应用基于椭圆曲线密码体制的双重离散对数证明协议和可公开验证的分布式密钥生成协议,设计了基于椭圆曲线密码体制的门限代理盲签名方案和可公开验证的分布式代理盲签名方案。
  6. A Zero-Knowledge Proof Scheme of Possessing a DSA Digital Signature
    DSA数字签名的零知识证明
  7. It is proved that the given protocol is a zero-knowledge interactive proof in the random oracle model, and it is shown that the scheme is more secure than the scheme of J.
    证明了在随机预言模型中给出的协议是零知识交互证明,并显示出通过参数的适当选取,此方案比J。
  8. Then a misunderstanding about the use of zero-knowledge ( ZK) proof in the DL-Key-Gen scheme proposed by R. Canetti etc.
    Canetti等人在设计分布式密钥生成方案(DL-Key-Gen)时,关于零知识证明使用的一个错误,并给出一种改进方案。
  9. In Xie Xuejun ( 2000), the design and performance of model reference adaptive controller for stochastic systems was given, and in this paper, the detailed proof of stability and optimality of the MRAC scheme is provided.
    解学军(2000)给出了一种模型参考自适应控制的设计方案,该文给出了其稳定性及最优性的详细证明。
  10. Based on the ideas of undeniable digital signature and confirmer digital signature, a new zero-knowledge proof scheme of possessing a DSA digital signature is proposed which can be used to prevent the arbitrary distribution of digital signature.
    基于不可否认签名和可证实签名的思想,提出了一种拥有DSA数字签名的零知识证明新方案。
  11. The idea of zero-knowledge proof is used in key updating protocol-, the signature protocol-, validity verification protocol of signature and the verification protocol of forward security. It can guarantee that the new scheme is more secure and efficient than previous schemes.
    对新方案的密钥更新协议、签名协议、签名的有效性验证协议、前向安全性验证协议用了零知识证明的思想,具有更高的安全性和效率。
  12. The security proof of the first scheme is based on the disperse logarithm problem ( DLP);
    一种方案的安全性证明是基于离散对数问题;
  13. We point out secure weakness of the Zero-knowledge proof scheme proposed by Sultan Al muhammad I and Clifford Neuman [ 1] in parameter selecting of public key, and analyze it from calculation of discrete logarithm.
    论文指出了文献[1]中的零知识证明协议在公钥参数选取上的安全漏洞,并从求解离散对数的角度进行了分析证明。
  14. Security Analysis and Improvement of A Zero-knowledge Proof Identification Scheme
    一种零知识证明协议的安全分析与改进
  15. The simulative result shows that the speeds of hydraulic explosion-proof hoist can be controlled effectively and reasonably by the selected scheme.
    仿真结果表明,所选算法能够有效合理地控制液压防爆提升机的速度。
  16. By actual application proof, systematic scheme design is reasonable, practicality is strong, solving the actual problem in stiff test machine data handling conscientiously.
    经实际应用证明,本系统方案设计合理,使用性强,切实解决了强力试验机数据处理中的实际问题。
  17. The formal security proof of this scheme is provided in the random oracle model.
    我们在随机预言模型下给出了方案的安全性证明。
  18. We point out that Shao's signature scheme using self-certified public key is not efficient and the security proof of Shao's scheme is not correct. We present a new signature scheme using self-certified public key;
    指出Shao的基于自证明公钥密码体制的数字签名方案的效率不高且安全性证明有误,提出一个新的基于自证明公钥密码体制的数字签名方案;
  19. Proof and Practice of the Incremental Capacity Scheme of TDK-200/ 16 Synchronous Motor
    TDK-200/16同步电动机增容方案的论证及实践
  20. A note on the proof of hopscotch scheme convergence
    关于跳点格式收敛性证明的注记
  21. Proof and Execution on scheme of Improvement of Operational Head during Dry Season at Kaiyuan Hydropower Station
    开元电站枯水期提高运行水头方案论证及实施
  22. For information protection system, based on Harn's digital signature scheme and zero knowledge proof, this paper presents a double way authentication access control scheme.
    针对信息保护系统,该文基于Harn数字签名方案和零知识证明构造了一种双向认证访问控制方案。
  23. We prove that the proof scheme is correctness, security and zero knowledge.
    我们证明了该方案是正确、安全和匿名的。
  24. The results of proof and simulation indicate that the perfection and improvement we make to the two-level scheduling scheme have achieved objectives proposed in this paper, so that scheduling theory for open hybrid real-time systems is perfected.
    理论证明和实验结果都表明,本文对双层调度框架所做的完善和改进达到了文中所提出的目标,从而完善了开放式混合实时系统调度理论。
  25. Blind signatures based on non-interactive zero-knowledge proof can protect privacy better, but it is still lack of efficient and secure schemes which can be realized. Using the optimal SP signature scheme, we construct an efficient and secure SP blind signature scheme.
    基于非交互式零知识证明的盲签名方案能够更好地保护签名的隐私性,但目前仍缺少高效安全的可实现方案,论文利用优化的SP签名方案,构建了一个高效安全的SP盲签名方案。
  26. A new certificateless public key encryption scheme is proposed. In this paper, we propose a new CL-PKE scheme which is based on the nice algebraic properties of Weil pairing and proof the security of the scheme formally in the random oracle model.
    本文充分利用Weil对的优良属性提出一个新的无证书加密方案,而且在RandomOracle模型下证明了所提方案是抗选择密文攻击安全的。
  27. On the strategies used for implementing the trust model, we use P-Grid to manage the trust information efficiently, and use the proof of interaction, PKI based scheme and data replication to increase the security and reliability of trust model implementation.
    在信任模型的实现策略上,使用P-Grid实现高效的信誉信息管理,使用交互凭证、PKI算法和数据备份技术来提高分布实现的安全性和可靠性。
  28. It realizes identity authentication by using identity-based signature scheme to construct authentication proof, and uses the remote attestation scheme to verify the trustiness of platform.
    方案利用基于身份的签名算法构造认证凭证实现对跨域用户的身份认证,同时利用可信计算的远程证明方法对用户平台的可信性进行验证。