| 1. | The set of participants to perform key agreement should satisfy threshold 该方案使得参与者可以协商秘密密钥,而不用基于离散对数假设。 |
| 2. | The public and private keys are based on a pair of very large prime numbers that are not known by anyone intercepting the message 公开密钥和秘密密钥是基于一对想截获报文的人不知道的非常大的素数。 |
| 3. | Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it 接收者利用发送者的公开密钥和他们自己的秘密密钥的结合,解开该报文的秘密编码,并解密之。 |
| 4. | The same key is used for both encryption and decryption , hence " symmetric key cryptography . " symmetric key cryptography is sometimes called secret key cryptography , as the security of the ciphertext depends upon the key being kept secret 由于加密和解密都使用相同的密钥,因此这种算法被称作“对称密钥加密” 。对称密钥加密有时也被称为秘密密钥加密,因为密文的安全取决于密钥能否被保密。 |
| 5. | The lack of an effective solution to the problem of secret key management inhibited the wide use of secret key cryptography in security practice . the emergence of public key cryptography solves the key management problem whereas it introduces another problem , the verification of public key authenticity 秘密密钥密码体制存在密钥管理的问题,而公钥密码体制在有效解决密钥管理问题的同时却又带来了公钥真实性的问题。 |
| 6. | The dynamic ( t , n ) threshold secret sharing scheme based on certificate uses the key in the participant ' s certificate as his share . this scheme can assure that any t participants can calculate the secret value , but no group of t - 1 participants can do so 基于证书的动态( t , n )门限秘密共享方案将每个参与者的证书公钥对应的秘密密钥作为子秘密,它能保证t个或t个以上的参与者联合可重构共享秘密,而少于t个参与者联合不能得到共享秘密的任何信息。 |
| 7. | First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm . second , we give the concepts of x . 509 certificate , crl ( certificate revocation list ) and certification path , and following this , we give some examples of certificate and authentication architectures . finally , we present an example of implementation of the certificate and key management system and some application cases of this system 论文首先简单介绍了秘密密钥密码体制、公开密钥密码体制、 hash函数以及基于x . 509的公钥证书等基础密码学理论;其次,论文描述了几种典型的证书体系和鉴别机制;最后给出了一个电子政务证书管理系统的具体实现例子。 |
| 8. | When there is not a trusted share distribution center , this dissertation gives a solution how the group signature is realized for vector space access structure , or constructs a vector space secret sharing - multisignature scheme without trusted share distribution center , and analyzes its security . the generalized - multisignature scheme is proposed based 在该方案中,参与者共享rsa签名方案的秘密密钥,能保证矢量空间访问结构中参与者的授权子集产生有效的rsa群签名,而参与者的非授权子集不能产生有效的rsa群签名。 |