密钥共享
sharing───v.分享;分担(share的ing形式);n.公用,共享
bike sharing───共享单车
sharing session───分享会
sharing van───共享货车
securely sharing───安全共享
sharing economy───分享经济
secret───n.秘密,机密;秘诀;奥秘;默祷;n.(Secret)(法)塞克雷(人名);adj.秘密的,机密的;不公开的;善于掩饰自己的
bicycle sharing───共享单车
work sharing───[经] 工作分担
We show that this class is within the scope of one-level threshold secret sharing schemes.───我们证明了这个类中的单调存取结构是可以被一阶门槛式秘密分享机制所实现。
It is based on publicly verifiable secret sharing theory.───其理论基础是公开可验证秘密分享原理。
This article proposes a new color visual secret sharing scheme.───提出一种新的彩色可视密码方案。
In this paper, a new secret-sharing multi-signature scheme without trusted center is analyzed, and a forged attack is given.───首先,对一种新的无可信中心的秘密共享-多重签名方案进行分析,并提出了一种伪造攻击;
We propose a scheme on secret sharing of an arbitrary two-atom entanglement via entanglement swapping in cavity QED .───提出一个利用纠缠转换在腔QED中来实现秘密共享一个任意两原子纠缠态的方案。
A verifiable vector space secret sharing scheme is proposed, whose security relies on the security of Elliptic Curve Cryptography (ECC).───提出了一种可验证的矢量空间密钥共享方案,其安全性依赖于椭圆曲线密码的安全性。
This thesis reviews the backgrounds and research advances of the secret sharing.───本文介绍了秘密共享的研究背景和现状。
Simultaneously the secret sharing technology is also the fundamental of threshold group signature.───同时秘密共享技术也是门限群签名的理论基础。
The thesis mainly contributes to the study of the protocols of quantum secret sharing.───本文主要对量子秘密共享方案进行了研究。
A vector space secret sharing - multisignature scheme without a trusted share distribution center is proposed.
Prior work on secret sharing update protocol based on synchronous system and is vulnerable for denial of service attacks.
A vector space secret sharing scheme against cheating was proposed for extending the normal threshold structure.
Secret sharing provides a scheme to assign power, for example, nuclear button, cashbox key of bank, etc.
An information-theoretical secure verifiable secret sharing protocol on this kind of access structures is proposed.
Verifiable secret sharing, group signature and signature of knowledge are useful in protecting important and sensitive information and always used in designing secure protocol of cryptology.
In the region-based multilevel visual secret sharing method, the secrets are recognized by inspecting the well-stacked shares using human eyes without any computation.
The Coding Theorem of Secret Sharing Communication System with Three Noise Channels.
We propose a scheme on secret sharing of an arbitrary two-atom entanglement via entanglement swapping in cavity QED.
- rature
- road ring
- pretty fair
- release from prison
- total voltage
- the first trial
- she best is for you
- snowball dance
- truth is beauty
- theoretical strength
- secret shop
- tight lipped
- theoretical stress
- road rippers
- suggestions for effective research
- simpletasklet stepcontribution
- steady life
- saccharizing
- tight lips
- release from quarantine
- push factors