秘密密鑰 的英文怎麼說
中文拼音 [bìmìmìyào]
秘密密鑰
英文
secret key-
Dr. aki ross voiced by actress ming - na has teamed up with captain gray edwards alec baldwin to search for the " eighth spirit, " a powerful entity dwelling in an unknown life form somewhere on the planet. it holds the key to perfecting a system of energy waves that will neutralize the phantoms
然而異種勢力驚人,死神逼在眉睫,唯一能拯救人類的就只有亞紀結合智慧與美貌的科學家,她掌握殲滅異種的秘密的鑰匙在地球上找尋八個「精神」 。( 3 ) the embedded watermark can be extracted only by using a secret key
( 3 )採用密鑰以加強水印的秘密性。Quantum key distribution and secret sharing via w states
態的量子密鑰分配和秘密共享Can t accept : it s an easily guessed word. enter new password : redrum can t accept : i read the shining, too
蠻力的密碼術攻擊為了破解一個秘密消息,需要按某種順序嘗試每一個可能的密鑰。Quantum cryptology is a new method for secret communications. this new method utilizes the quantum nature of single photons. data can be transferred with a proven security via the protocols of quantum key distribution
量子密碼術是一種實現秘密通信的新方法,它利用單光子的量子性質,藉助量子密鑰分配協議可實現數據傳輸的可證性安全。The critical operation in public - key encryption is verifying the identity of a message s recipient, so as to encrypt with the correct public key
其中我們最喜歡的一個就是用於秘鑰加密演算法的「百萬位密鑰」廣告。The private key is secret and must be protected with a password
私人密鑰是秘密的,因此必須有密碼保護。The set of participants to perform key agreement should satisfy threshold
該方案使得參與者可以協商秘密密鑰,而不用基於離散對數假設。The public and private keys are based on a pair of very large prime numbers that are not known by anyone intercepting the message
公開密鑰和秘密密鑰是基於一對想截獲報文的人不知道的非常大的素數。Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it
接收者利用發送者的公開密鑰和他們自己的秘密密鑰的結合,解開該報文的秘密編碼,並解密之。The same key is used for both encryption and decryption, hence " symmetric key cryptography. " symmetric key cryptography is sometimes called secret key cryptography, as the security of the ciphertext depends upon the key being kept secret
由於加密和解密都使用相同的密鑰,因此這種演算法被稱作「對稱密鑰加密」 。對稱密鑰加密有時也被稱為秘密密鑰加密,因為密文的安全取決於密鑰能否被保密。The lack of an effective solution to the problem of secret key management inhibited the wide use of secret key cryptography in security practice. the emergence of public key cryptography solves the key management problem whereas it introduces another problem, the verification of public key authenticity
秘密密鑰密碼體制存在密鑰管理的問題,而公鑰密碼體制在有效解決密鑰管理問題的同時卻又帶來了公鑰真實性的問題。The dynamic ( t, n ) threshold secret sharing scheme based on certificate uses the key in the participant ' s certificate as his share. this scheme can assure that any t participants can calculate the secret value, but no group of t - 1 participants can do so
基於證書的動態( t , n )門限秘密共享方案將每個參與者的證書公鑰對應的秘密密鑰作為子秘密,它能保證t個或t個以上的參與者聯合可重構共享秘密,而少於t個參與者聯合不能得到共享秘密的任何信息。First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system
論文首先簡單介紹了秘密密鑰密碼體制、公開密鑰密碼體制、 hash函數以及基於x . 509的公鑰證書等基礎密碼學理論;其次,論文描述了幾種典型的證書體系和鑒別機制;最後給出了一個電子政務證書管理系統的具體實現例子。When there is not a trusted share distribution center, this dissertation gives a solution how the group signature is realized for vector space access structure, or constructs a vector space secret sharing - multisignature scheme without trusted share distribution center, and analyzes its security. the generalized - multisignature scheme is proposed based
在該方案中,參與者共享rsa簽名方案的秘密密鑰,能保證矢量空間訪問結構中參與者的授權子集產生有效的rsa群簽名,而參與者的非授權子集不能產生有效的rsa群簽名。The sender of an internet communication can not necessarily be presumed to be who he says he is, nor can the sender always be sure of the recipient s true identity
另一把叫「私人鑰匙」 ( privatekey ) ,這把鑰匙只能由其持有人知道,並且必須保持秘密性。Then the strong - rooms underground, at tellson s, with such of their valuable stores and secrets as were known to the passenger and it was not a little that he knew about them, opened before him, and he went in among them with the great keys and the feebly - burning candle, and found them safe, and strong, and sound, and still, just as he had last seen them
於是臺爾森銀行地下室里的保險庫在他眼前打開了,裏面是他所熟悉的寶貴的貯藏品和秘密這類東西他知道得很不少。他手執巨大的鑰匙串憑借著微弱的燭光在貯藏品之間穿行,發現那裡一切安全堅實穩定平靜,跟他上次見到時完全一樣。Both peer a and peer b can use a shared key to exchange a secret message, or peer a can use the private key that corresponds to a public key that peer b holds to perform the same operation
如對等點a和對等點b都可以用一個共享密鑰交換秘密的訊息,或對等點a可以使用對應于對等點b持有的公用密匙的私用密鑰來完成同樣的操作。If you want to export the certificate sometime in the future, check on box mark the private key as exportable as well
如您想在今後可以匯出此證書及配對密碼匙,請同時選擇將秘密金鑰標示為可匯出的。That kid yoo jin has the keys to that secret
由珍那孩子掌握了這個秘密的鑰匙分享友人