public key encryption system meaning in Chinese
公共密钥加密系统
Examples
- And use bna logic theories to prove the completeness and validity of the improved protocol . 4 on the base of former research , a new model of user authentication system is designed based on the improved kerberos protocol and public key encryption system
并采用ban逻辑理论证明改进协议的完备性、有效性; 4 、提出了基于改进kerberos协议和公钥密码体制的身份认证服务的模型,并给出模型的实际应用。 - The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm , uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec
综上所述,本论文所作的主要工作有: ( 1 )对目前应用较广的公钥密码体制rsa和ecc算法及加解密实现进行比较。 ( 2 )针对目前已有的椭圆曲线攻击算法,使用sea算法实现了安全椭圆曲线的选取,实现了基于大素数域上的椭圆曲线的elgamal加解密和数字签名。 ( 3 )讨论了椭圆曲线在智能卡上的应用,并提出了两种基于ecc的身份认证方案。