助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   组加密 的翻译结果: 查询用时:0.018秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
电信技术
更多类别查询

图标索引 历史查询
 

组加密
相关语句
  group encryption
     According to reference,this paper introduces a model and a fair multi-party Non-repudiation protocol by using group encryption without TTP.
     该文参考文献眼1演,提出了一种协议模型,运用组加密方案构造了一个不含可信第三方的公平的多方不可否认协议。
短句来源
  “组加密”译为未确定词的双语例句
     APPLICATION OF RESERVOIR NUMERICAL SIMULATION TECHNOLOGY IN THE INFILLING-ADJUSTED LOWER WUERHE FORMATION
     油藏数值模拟技术在克拉玛依油田八区下乌尔禾组加密调整中的应用
短句来源
  相似匹配句对
     The SV and CO of the treatment group B increased in 5 minutes, which wa
     B
短句来源
     Group E is the highest.
     B
短句来源
     ENCRYPTION FOR DATA BASE
     数据库的加密
短句来源
     Encryption for XML
     XML加密
短句来源
     (t,n) Threshold Shared Verification Signature Encryption Scheme with Specified Receiving Groups
     具有指定接收(t,n)门限共享验证签名加密方案
短句来源
查询“组加密”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  group encryption
A group encryption scheme is used to encrypt the key k for the recipients R in our protocol.
      
For this purpose we use a public-key group encryption scheme.
      
In order to cipher only once and to use multicasting, Alice uses a group encryption scheme.
      
In order to release the key only to the honest parties, a group encryption mechanism is needed.
      
Moreover, using the idea of group encryption, other protocols can be generalized.
      
更多          
  group cryptography
Although braid group cryptography had initial spectacular success, various potential attacks have been identified.
      
Braid group cryptography, where encryption is done within the classical braid groups, is one prominent example.
      


The security technology used for the protocol of user authentication and secure key distribution in GMS mobile communication system is described and discussed. The modified fast encipher algorithm (FEAL) is used as a core algorithm for dual hash function FEAL 4(X)S encipher algorithm with 2M bits to realize A3/A8 algorithm for user authentication and secure key distribution in GMM mobile system. The performance of this algorithm is discussed, and the simulation results are given.

首先分析研究了GSM(Globalsystem for m obile)数字移动通信系统的安全技术,特别是有关用户鉴权与密钥分配的协议,然后以改进的FEAL算法为核心,构造了一个2M 比特并联杂凑FEAL-4(X)S加密算法,实现了GSM 数字移动通信系统的身份认证与密钥分配的A3/A8 算法。本文对该组加密算法及其性能进行了详细分析,并给出了在计算机上模拟的结果。

Non-repudiation is one of the most important premises to achieve electronic commerce while fairness is what people have been chasing during electronic transaction. Fair non-repudiation protocols resolve the question of non-repudiation during the course of transferring information in electronic commerce and make all communicating sides in equal positions. That is to say, the protocols are fair for all sides. In the present paper, a fair multi-party non-repudiation protocol based on a group encryption scheme is...

Non-repudiation is one of the most important premises to achieve electronic commerce while fairness is what people have been chasing during electronic transaction. Fair non-repudiation protocols resolve the question of non-repudiation during the course of transferring information in electronic commerce and make all communicating sides in equal positions. That is to say, the protocols are fair for all sides. In the present paper, a fair multi-party non-repudiation protocol based on a group encryption scheme is introduced. The flow of the protocol and its analysis are given in the paper. In the protocol, every side can not have advantages over other sides, because the advantages can result in great loss of other sides. The method that how to solve the dissension with this protocol is also given in the present paper. A trusted third party is used to generate non-repudiation evidence. With this method the number of exchanged messages is small. So this protocol can achieve non-repudiation service in an efficient and practical way.

公平的不可否认协议解决了电子商务中信息传输的互相否认问题 ,使通信各方处于平等的位置。协议对各方都是公平的。该协议是基于组加密方法的 ,由可靠的第三方产生不可否认证据 ,数据交互次数少 ,高效实用。

A number of Non-repudiation protocols usually include a Trusted Third Party(TTP).In practice,it is difficultto find a TTP in some circumstances.According to reference,this paper introduces a model and a fair multi-party Non-repudiation protocol by using group encryption without TTP.Without bit by bit exchange,the protocol can resist attacks from outsiders and denial from insiders,so it is secure and efficient.

现有的不可否认协议一般都包括一个可信的第三方,但是,在实际生活中,要找到这样的可信第三方是很难的。该文参考文献眼1演,提出了一种协议模型,运用组加密方案构造了一个不含可信第三方的公平的多方不可否认协议。该协议不是秘密的逐渐泄露,能抵抗外部攻击与内部否认,安全高效。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关组加密的内容
在知识搜索中查有关组加密的内容
在数字搜索中查有关组加密的内容
在概念知识元中查有关组加密的内容
在学术趋势中查有关组加密的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社