The recipient of the payload can validate the digital signature using the public key of the sender.
有效载荷的接收者可以使用发送者的公开密钥验证数字签名。
The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.
可信的第三方通过使用其自己的签名发出证书,为公开密匙和识别信息做证明。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
When Ellie receives the message from Jethro, her Lotus Notes client checks his signature via his digital certificate containing his public key that was published in a directory.
当ellie收到Jethro发出的消息时,她的LotusNotes客户程序就会使用在一个目录中发布的包含Jethro的公开密钥的数字证书检查签名。
Only the holder of the key can create the signature, whereas anyone with access to the public key (usually taken from an X.509 Certificate) can validate the signature.
只有密匙的持有者能够创建签名,而所有能够访问公共密匙(通过来自 X.509Certificate)的人都可以验证签名。
Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。
A signed public key has a digital signature (quite analogous to a human signature) that states that the signer vouches for the public key.
签名公钥有数字签名(非常类似于人工签名)来表明签署者对公钥的担保。
This section describes the process of generating the public-private key pair, which is the basis for encryption and digital signature.
这一部分介绍生成公钥-私钥对的过程,这是加密和数字签名的基础。
The signature verifier must have access to the public key certificate that contains the public key associated with the private key used to produce the signature.
签名验证者必须有权使用包含与用于生成签名的私钥关联的公钥的公钥证书。
The receiver uses the sender's corresponding public key to verify the digital signature.
接收方使用发送方的对应公钥验证数字签名。
In order to verify that a public key certificate is legitimate, I need to verify the signature of the signer that issued it.
为了验证公钥证书是合法的,我需要检验发出该签名的签名者。
Next the digital signature is encrypted using the public key for Alice.
接下来,将使用Alice的公钥对数字签名进行加密。
Verifying the signature of the message using the public key of sender to authenticate the sender and to verify integrity of the message.
使用发送方的公钥来检验消息的签名,以便验证发送方并确认消息的完整性。
Then the digital signature of the request is verified using the soaprequestor public key.
然后将使用soaprequestor公钥验证请求的数字签名。
The digital signature on a public key certificate can validate the authenticity of the public key and therefore the party who holds it.
公钥证书上的数字签名可以验证该公钥的可靠性以及持有它的那一方的可靠性。
Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signer's forgery and public key substitution attack.
此外,该方案不仅满足代理签名的基本性质,还避免了代理权滥用、原始签名人伪造和公钥替换攻击。
How can I validate an ECDSA signature using the signed data, signature and the signer ECDSA public key?
我如何使用签名的数据验证的ECDS A签名,签名和签名者的签名的公共密钥?
The scheme perfectly integrates digital signature scheme with public key cryptography system.
该方案是数字签名与公钥密码体制的有机集成。
Then to combine the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides.
然后,利用改进的加密方案,结合RS A签名算法,设计了一个双方不可否认的小公钥rsa加密协议。
But how to solve the possibility of the public key and private key holder denying the certainty of documentation is a problem, and electronic signature technology can not deal with it itself.
但是如何解决公共密钥的确定性以及私人密钥持有者否认签发文件的可能性问题,则是电子签名技术本身无法解决的问题。
This paper represents an improved method of digital signature, which is based on the principle of combined public key(CPK) and combined with the algorithm of elliptic curve cryptosystem(ECC).
利用组合公钥体制(CPK)的基本思想,结合椭圆曲线加密(ECC)算法,提出了一种改进的数字签名方案。
The certificateless signature scheme can suffer from public key replacement attack so that any one can forge a valid signature on any message.
该方案能受到替换公钥攻击,以至于任何人都能对任何消息成功伪造签名。
For traditional digital signature, the signature information has only one signature member, any the verification member can use the public key to verify the validity of the signature.
在传统的数字签名中,对信息的签名只需要一个签名者,任何验证者使用签名公钥就可验证签名的有效性。
It is shown here that S-L-H scheme is insecure against the public key substitution attack and an improved threshold proxy signature scheme is proposed.
这里指出s - L - H方案不能抵抗公钥替换攻击,并给出了一个改进的门限代理签名方案。
This paper presents a blind group signature scheme based on XTR public key system, and analyzes its security and efficiency.
本论文提出了一种基于XTR公钥体制的盲群签名方案并分析了其安全性和效率。
A strong name consists of the assembly's identity-its simple text name, version number, and culture information (if provided) -plus a public key and a digital signature.
强名称是由程序集的标识加上公钥和数字签名组成的。其中,程序集的标识包括简单文本名称、版本号和区域性信息(如果提供的话)。
The protocol USES such technologies as symmetrical key encryption, public key encryption, Hasche algorithm, digital signature as well as public key authorization mechanism and so on.
该协议采用的技术包括,对称密钥加密、公共密钥加密、哈希算法、数字签名技术以及公共密钥授权机制等。
The basic principal of realizing the Digital Signature application as well as some essential key technologies including public key Encryption, Message Decomposition Function (MDF) are discussed here.
本文主要论述了数字签名技术的基本实现原理,包括公钥加密技术、报文分解函数(MDF)等实现数字签名应用的关键技术。
The digital signature is different from traditional signature, it is based on public key cryptosystems and is constructed by cryptogram arithmetic.
数字签名不同于传统的手写签名方式,它是基于公钥密码体制,依据一定的密码算法构造而成的。
The digital signature is different from traditional signature, it is based on public key cryptosystems and is constructed by cryptogram arithmetic.
数字签名不同于传统的手写签名方式,它是基于公钥密码体制,依据一定的密码算法构造而成的。
应用推荐