The third party USES the message, the key signature and the known public key to verify the source as trusted.
第三方再根据该讯息、金钥签章与已知的公开金钥,认证该讯息具有可信赖的来源。
In this paper, an efficient self-certified public key signature scheme was proposed by using bilinear pairings.
为此使用双线性对,构造了一种高效的自认证公钥签名方案。
Based on the NP-complete weak independence problem, a concrete scheme is proposed to exemplify the shared-key signature.
基于NP -完全的弱独立性问题,给出一个具体的签字方案。
A key signature is placed at the beginning of a piece of music or of a section to indicate the key of the piece or section.
调号位于一篇音乐作品或一章节的开始部分,来表示该作品或章节的调域。
XML Encryption relies entirely on the XML Digital Signature specification for key exchange.
对于密钥交换XML加密完全依赖于 XML数字签名规范。
The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.
可信的第三方通过使用其自己的签名发出证书,为公开密匙和识别信息做证明。
The recipient of the payload can validate the digital signature using the public key of the sender.
有效载荷的接收者可以使用发送者的公开密钥验证数字签名。
Modification of this variable is key to determining what amount of variability is acceptable during a click-time signature match.
修改此变量对于确定在匹配单击时间签名时可以接受的可变性非常关键。
The process involves the sender generating the message digest, then encrypting the digest using its private key to create the digital signature.
这个过程包括发送方生成消息摘要,然后用其私钥对摘要加密以创建数字签名。
Only the holder of the key could have created the signature component.
只有密钥持有者才能创建签名组件。
The second byte of "01" indicates that this is a private key operation (e.g. it's a signature).
第二个字节“01”说明这是一个私钥操作(如,它是一个签名)。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
A signed public key has a digital signature (quite analogous to a human signature) that states that the signer vouches for the public key.
签名公钥有数字签名(非常类似于人工签名)来表明签署者对公钥的担保。
This signature is based on a common IBM master key, which is available only inside IBM.
此数字签名基于公用IBM主控密钥,此密钥仅在 IBM内可用。
The operation signature is changed to accept, in addition to a key, a request template, and then returns a response template.
操作签名更改为接收请求模板(和密钥),然后返回响应模板。
An XML signature generated from the private key of the sender and affixed to the XML ensures the non-refutability of the sender.
由发送者的私钥生成的附在xml上的XML签名保证了发送者的不可驳性。
Similarly, with a digital signature the sender of the message signs the message using his or her own private key.
类似地,数字签名则是消息发送方使用自己的私钥签署消息。
The signature verifier must have access to the public key certificate that contains the public key associated with the private key used to produce the signature.
签名验证者必须有权使用包含与用于生成签名的私钥关联的公钥的公钥证书。
The signature component of the message (see Listing 6) provides the proof of possession of the Secret Key id.
消息的签名组件(见清单6)提供拥有SecretKeyID的证明。
When Ellie receives the message from Jethro, her Lotus Notes client checks his signature via his digital certificate containing his public key that was published in a directory.
当ellie收到Jethro发出的消息时,她的LotusNotes客户程序就会使用在一个目录中发布的包含Jethro的公开密钥的数字证书检查签名。
apikey=Qwerty2010×tamp=1261496500" and the signature is the HMAC-SHA256 hash of that string using the private component of the API key.
apikey=Qwerty2010×tamp=1261496500" ”,而签名是应用API密钥的私钥所得到的HMAC-SHA256哈希值。
Each issued U-Prove token contains an unforgeable digital signature of its Issuer on the entire contents, created by the Issuer by applying its private key.
每个发布的U - Prove令牌都包含了发布方关于所有内容的不可伪造的数字签名,这是通过使用它的私钥由发布方创建的。
KeyInfo indicates the key to be used to validate the signature.
KeyInfo表示用于验证签名的金钥。
The third command creates a 1024-bit Digital Signature Algorithm (DSA) key (-b 1024 -t dsa), turns off output (-q), and specifies the name of the key and that there is no password.
第三个命令创建了一个 1024位的DigitalSignatureAlgorithm (DSA)密钥(-b 1024-t dsa),关闭输出(-q),指定密钥的名称,在这里不指定密码。
Only the holder of the key can create the signature, whereas anyone with access to the public key (usually taken from an X.509 Certificate) can validate the signature.
只有密匙的持有者能够创建签名,而所有能够访问公共密匙(通过来自 X.509Certificate)的人都可以验证签名。
Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。
However, the roles of X.509 key pairs are reversed for digital signature and encryption.
然而,用于数字签名和加密的X . 509密钥对的角色是颠倒的。
The output is likely to continue with a message to the effect that the key is not certified with a trusted signature.
输出结果可能继续是一条消息,大致意思是密钥不能被一个可信签名所认证。
One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).
演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
This section describes the process of generating the public-private key pair, which is the basis for encryption and digital signature.
这一部分介绍生成公钥-私钥对的过程,这是加密和数字签名的基础。
应用推荐