The signature component of the message (see Listing 6) provides the proof of possession of the Secret Key id.
消息的签名组件(见清单6)提供拥有Secret KeyID的证明。
One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).
演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
Instead, it is used to create a form of digital signature that is used to provide proof of possession of the Secret Access Key.
相反,它被用于创建某种形式的数字签名,而该签名用于证明拥有Secret Access Key。
In most available threshold signature schemes, only one group secret key is Shared among a group of signers and the threshold value is fixed.
现有大多数门限签名体制存在一个共同的问题:门限值是固定的,这限制了它们的应用范围。
The management of power-cut application, dispatching task note and secret key etc and the application of digital signature can ensure that the system is an efficient, secure, and powerful MIS.
通过对停电申请、调度任务票、交接班记录等,以及密钥等的管理以及数字签名在系统中的实现,使得本系统成为一个高效、完善、安全的管理信息系统。
Even if the current secret key of proxy signer has been leaked, the attacker can't forge the proxy signature of the past period time.
即使当前时段的代理签名密钥泄露,攻击者也无法得到以前时段的代理签名。
Forward security of the scheme means that even if the secret key of current time period is compromised, some security remains. It is impossible to forge the signature relating to the past.
方案的前向安全性保证了签名密钥可定期更新,即使当前时间段的签名密钥被泄漏,敌手也不能伪造先前的签名。
After receiving a signature, the receiver can recover and then verify the message by only using his secret key and the signer"s public key;"
收到签名后,接收者只用自己的私钥和签名者的公钥来恢复、验证消息;
The scheme utilizes the theory and technology of forward-secure digital signature to guarantee that the loss is the lowest in the case that CA's signing secret key is compromised;
该方案利用前向安全数字签名理论和技术,保证了一个PKI系统在CA签名密钥泄露的情况下损失最小;在CA需要更换签名密钥时效率最高;
The scheme utilizes the theory and technology of forward-secure digital signature to guarantee that the loss is the lowest in the case that CA's signing secret key is compromised;
该方案利用前向安全数字签名理论和技术,保证了一个PKI系统在CA签名密钥泄露的情况下损失最小;在CA需要更换签名密钥时效率最高;
应用推荐