The Fail-stop signature is a very secure system, even though the attacker gains signature key, it is difficult to forge signature.
防失败签字是一种十分安全的签字体制,即使攻击者得到签字密钥后也难以伪造签字。
In this scheme, the key updating algorithm is used by the original signer, so the security of the proxy signature key is promoted to a higher level.
该方案将密钥更新算法应用在原始签名者计算过程中,更有效增强了代理签名密钥的安全性。
Smart Card can effectively protect the information security because it can store and explain the private signature key and certificate, realize digital signature and authentication.
智能卡能够存储和解释私人签名密钥和证书,实现数字签名和认证,有效的保证信息的安全。
XML Encryption relies entirely on the XML Digital Signature specification for key exchange.
对于密钥交换XML加密完全依赖于 XML数字签名规范。
The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.
可信的第三方通过使用其自己的签名发出证书,为公开密匙和识别信息做证明。
The recipient of the payload can validate the digital signature using the public key of the sender.
有效载荷的接收者可以使用发送者的公开密钥验证数字签名。
Modification of this variable is key to determining what amount of variability is acceptable during a click-time signature match.
修改此变量对于确定在匹配单击时间签名时可以接受的可变性非常关键。
The process involves the sender generating the message digest, then encrypting the digest using its private key to create the digital signature.
这个过程包括发送方生成消息摘要,然后用其私钥对摘要加密以创建数字签名。
Only the holder of the key could have created the signature component.
只有密钥持有者才能创建签名组件。
The second byte of "01" indicates that this is a private key operation (e.g. it's a signature).
第二个字节“01”说明这是一个私钥操作(如,它是一个签名)。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
A signed public key has a digital signature (quite analogous to a human signature) that states that the signer vouches for the public key.
签名公钥有数字签名(非常类似于人工签名)来表明签署者对公钥的担保。
This signature is based on a common IBM master key, which is available only inside IBM.
此数字签名基于公用IBM主控密钥,此密钥仅在 IBM内可用。
The operation signature is changed to accept, in addition to a key, a request template, and then returns a response template.
操作签名更改为接收请求模板(和密钥),然后返回响应模板。
An XML signature generated from the private key of the sender and affixed to the XML ensures the non-refutability of the sender.
由发送者的私钥生成的附在xml上的XML签名保证了发送者的不可驳性。
Similarly, with a digital signature the sender of the message signs the message using his or her own private key.
类似地,数字签名则是消息发送方使用自己的私钥签署消息。
The signature verifier must have access to the public key certificate that contains the public key associated with the private key used to produce the signature.
签名验证者必须有权使用包含与用于生成签名的私钥关联的公钥的公钥证书。
The signature component of the message (see Listing 6) provides the proof of possession of the Secret Key id.
消息的签名组件(见清单6)提供拥有SecretKeyID的证明。
When Ellie receives the message from Jethro, her Lotus Notes client checks his signature via his digital certificate containing his public key that was published in a directory.
当ellie收到Jethro发出的消息时,她的LotusNotes客户程序就会使用在一个目录中发布的包含Jethro的公开密钥的数字证书检查签名。
apikey=Qwerty2010×tamp=1261496500" and the signature is the HMAC-SHA256 hash of that string using the private component of the API key.
apikey=Qwerty2010×tamp=1261496500" ”,而签名是应用API密钥的私钥所得到的HMAC-SHA256哈希值。
Each issued U-Prove token contains an unforgeable digital signature of its Issuer on the entire contents, created by the Issuer by applying its private key.
每个发布的U - Prove令牌都包含了发布方关于所有内容的不可伪造的数字签名,这是通过使用它的私钥由发布方创建的。
KeyInfo indicates the key to be used to validate the signature.
KeyInfo表示用于验证签名的金钥。
The third command creates a 1024-bit Digital Signature Algorithm (DSA) key (-b 1024 -t dsa), turns off output (-q), and specifies the name of the key and that there is no password.
第三个命令创建了一个 1024位的DigitalSignatureAlgorithm (DSA)密钥(-b 1024-t dsa),关闭输出(-q),指定密钥的名称,在这里不指定密码。
Only the holder of the key can create the signature, whereas anyone with access to the public key (usually taken from an X.509 Certificate) can validate the signature.
只有密匙的持有者能够创建签名,而所有能够访问公共密匙(通过来自 X.509Certificate)的人都可以验证签名。
Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。
However, the roles of X.509 key pairs are reversed for digital signature and encryption.
然而,用于数字签名和加密的X . 509密钥对的角色是颠倒的。
The output is likely to continue with a message to the effect that the key is not certified with a trusted signature.
输出结果可能继续是一条消息,大致意思是密钥不能被一个可信签名所认证。
One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).
演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
This section describes the process of generating the public-private key pair, which is the basis for encryption and digital signature.
这一部分介绍生成公钥-私钥对的过程,这是加密和数字签名的基础。
The receiver uses the sender's corresponding public key to verify the digital signature.
接收方使用发送方的对应公钥验证数字签名。
应用推荐