sharing a secret 中文意思是什麼

sharing a secret 解釋
告 訴 你 一 個 秘 密
  • sharing : 共同具有
  • a : an 用在以母音音素開始的詞前〉 indefinite art 1 〈普通可數名詞第一次提到時,冠以不定冠詞主要表示類...
  • secret : adj 1 秘密的;機密的;隱秘的。2 僻遠的。3 隱藏的;看不見的。4 神秘的;奧妙的;不可思議的。5 隱居...
  1. A dynamic secret sharing scheme to identify cheaters

    一種可驗證的動態秘密分享方案
  2. 5 ~. an anonymity - revocable divisible e - cash system is designed. 6 ~ a verifiable secret sharing scheme is proposed and a divisible c - cash system is designed based on it. 7 ~. a design of pki using object - oriented technique is given

    作者的研究成果如下: ( 1 )採用面向對象的思想,對pki系統進行分析和設計,以抽象的概念闡述pki的結構、組成和功能。
  3. Firstly, by means of the intractability of discrete logarithm problem, a threshold secret sharing scheme with periodic renewing to identify cheaters is established. shares are periodically renewed without changing the secret. every participant is able to verify the share he receives and those other participants show

    首先,利用離散對數問題的難解性,給出了一個定期更新防欺詐的門限秘密共享方案,它在保持共享秘密不變的情況下定期對子秘密進行更新,每個參與者可以對自己的子秘密及其他成員出示的子秘密進行驗證,不但能有效阻止敵手竊取秘密或子秘密,也能有效地防止內部成員之間的互相欺詐。
  4. A vector space secret sharing - multisignature scheme is proposed based on vector space secret sharing scheme and multisignature scheme. the security of this scheme is analyzed

    把矢量空間秘密共享方案與多重簽名方案結合起來,建立矢量空間秘密共享-多重簽名方案,並對該方案的安全性進行了分析。
  5. The threshold scheme is actually a particular case of the vector space secret sharing scheme. therefore the vector space secret sharing scheme can find more applications than the threshold scheme. in the above two schemes, every participant is required verifying the shares of the other participants, and the computation complexity is relatively high

    在上述兩個方案中,每一個參與者都需對其餘參與者出示的子秘密進行驗證,驗證工作量很大,有時在實際當中需要採用計算量比較小的方案,並且能夠發現欺詐者的存在。
  6. When there is not a trusted share distribution center, this dissertation gives a solution how the group signature is realized for vector space access structure, or constructs a vector space secret sharing - multisignature scheme without trusted share distribution center, and analyzes its security. the generalized - multisignature scheme is proposed based

    在該方案中,參與者共享rsa簽名方案的秘密密鑰,能保證矢量空間訪問結構中參與者的授權子集產生有效的rsa群簽名,而參與者的非授權子集不能產生有效的rsa群簽名。
  7. If the sharing secret algorithm based on chinese remainder theorem is expanded by database watermark, full watermark information can not only be recovered only with a part of watermark, but also the data for watermark can be reduced, moreover the performance can be improved significantly

    通過研究發現,如果將基於中國剩餘定理的秘密共享思想加以擴展后應用於數據庫水印演算法,不僅能夠基於部分數據恢復水印信息,而且水印數據的擴張大量減少,演算法性能有更進一步的提高。
  8. A secret sharing scheme with access structures is proposed, which is based on luc public key cryptosystem

    摘要基於luc公鑰密碼體制提出了一個訪問結構上的秘密共享方案。
  9. This scheme can efficiently prevent adversaries from getting the secret or shares, and prevent some participants from cheating others. afterwards, the threshold secret sharing scheme with periodic renewing to identify cheaters is extended to the vector space access structure, and a vector space secret sharing scheme with periodic renewing to identify cheaters is proposed

    然後將定期更新防欺詐門限秘密共享方案加以推廣,使其適合於矢量空間訪問結構,得出定期更新防欺詐限矢量空間秘密共享方案,該方案包括門限方案作為其特殊情形,所以該方案具有更廣泛的適應性。
  10. Chien - chang chen, wen - yin fu, chaur - chin chen, " a geometry - based secret image sharing approach ", image and vision computing new zealand, new zealand, november, 2005

    陳建彰,傅文殷, "以線性幾何投影法為基礎的機密影像分享方法" ,商管與資訊研討會,靜宜大學, 2005年9月
  11. Based on the threshold secret sharing mechanism, a new efficient distributed group key management scheme named edgk was proposed

    摘要基於門限秘密分享技術,提出一種高效的分散式組密鑰管理方案edgk 。
  12. A new threshold proxy signature scheme with known signers based on bilinear pairings theory is proposed using the technique of verifiable secret sharing

    摘要利用雙線性對理論和可驗證的秘密分享技術,提出了一種新的具有已知簽名者的門限代理簽名方案。
  13. Based on a one - dimensional cellular automata and the chinese remainder theorem, a new multi - secret sharing scheme was proposed in this paper

    摘要基於一維細胞自動機和中國剩餘定理提出了一個新的多秘密共享方案。
  14. Using the idea of secret - sharing and signature - of - knowledge, a new perfect and strong key - insulated signature scheme based on the assumption of integer factorization problem is proposed. the scheme has a low computation in key updating and signing, thus fitting for the mobile devices

    ( 6 )對簽名系統中的密鑰泄露問題進行了研究,在分析相關技術的基礎上,利用秘密分享和知識簽名,給出了一個完善的強key - insulated簽名方案。
  15. Finally, a new threshold and confirmer signature scheme for group or organization is proposed by using the multiplicative secret sharing and rsa public key cryptosystem, whose confirming and denying protocols are constructed by using the idea of zero - knowledge proof

    提出適合於團體和組織的門限證實數字簽名方案。新方案以乘法秘密共享和rsa加密演算法為基礎,採用一次性零知識證明思想構建簽名的證實協議和否認協議。
  16. A non - interactive protocol for member expansion in a secret sharing scheme

    一種秘密共享新個體加入協議
分享友人