term share meaning in Chinese
定期股票
Examples
- List as follows : firstly , the saka protocol is analysed , because the authentication codes of the two protocol participants completely lie on the long - term shared key , so it does not resist key - compromise impersonation
具体工作如下:首先,分析了saka协议,由于协议参与者双方的认证码完全依赖于长期共享密钥,因此它不具有密钥泄漏的安全性。 - In this new protocol , the authentication code of the its initiator depend on the shared long term key , but the authentication code of the its responder relies on session key , and the session key is a hashed value of concatenation of the long - term shared key , the scalar multiplication of the long - term private key and ephemeral public key , and the scalar multiplication of the private key and long - term public key , which ensure that the protocol resists key - compromise impersonation
在新协议中,协议起始方的认证码依赖于长期共享密钥,但协议的应答方的认证码依赖于会话密钥,且会话密钥是由长期共享密钥、长期私钥与临时公钥的积和临时私钥与长期公钥的积三部分串起来的哈希值,这就保证它具有密钥泄漏的安全性。