首页 / 词典 / good

kgc

  • 网络密钥生成中心;金斯科特;卡杰诗;小森图像技术中心
kgckgc
  1. Import and application of KGC technology for converter bottom blowing

    转炉底吹KGC技术的引进与应用

  2. KGC provides the latest in lockout design technology to protect both lives and the environment .

    KGC采用最新的锁定设计技术,用以保护人身安全与环境。

  3. Once the KGC no longer trusted , the system will be in total collapse .

    若KGC不再可信或被攻破,则整个密码系统将面临崩溃。

  4. Chapter four introduces KGC , analyze market situation and point out the importance of CRM to KGC .

    第四章介绍了长城协同公司,分析了市场现状,指出了实施CRM管理的重要性。

  5. For resisting both attacks launched by KGC and outside attacker , KGC should sign the user public key with its master key , but not the user private key .

    为了抵制KGC同时抵制外部攻击者的拒绝解密攻击,应该让KGC用自己的主密钥对用户公钥签名,而不再用用户私钥对自身的用户公钥签名。

  6. Analysis results show the two schemes can resist forgery attacks and conspired attacks ( including KGC ), and can meet with the requirements of unconditional anonymity of signers .

    分析显示此两个方案均能抵抗任何(包括KGC)伪造攻击,且都满足签名者的无条件匿名性。

  7. Nowadays , many centificateless signature schemes depend on the honesty of Key Generation Center ( KGC ) excessively , so they also lose security guarantees when the KGC is dishonest .

    现在许多无证书签名方案过度依赖于密钥生成中心(KGC)的诚实性,所以当KGC失去诚信的时候这些方案也就失去了安全保证。

  8. Analysis results show the two schemes can resist any forgery attacks and conspired attacks ( including KGC ) . Two secure schemes of certificateless ring-signature and certificateless ring proxy signature based on CL-PKC are proposed .

    分析显示两个方案均能抵抗任何人(包括KGC)的伪造攻击和合谋攻击。基于CL-PKC提出了两个安全的无证书环签名方案和无证书环代理签名方案。

  9. The basic thought of his scheme is that when KGC distributes user private key , there is a key distribution protocol implemented between user and KGC , so the user private key has not only produced by KGC self as former IBE scheme .

    其基本思想是在KGC分发用户私钥时在用户和KGC之间执行一个密钥分发协议,而不像基于身份加密体制那样单独由KGC分发。

  10. So using the anonymity also can resist the center forged attacks launched by KGC . Conclusion , the paper researches authority trust problem in identity-based encryption scheme with several methods , including CL-PKE , A-IBE and anonymity method , and even more discuss the DOD attacks in CL-PKE scheme .

    总之,本文采用多种方法研究了基于身份加密体制的中心信任问题,包括CL-PKE、A-IBE和匿名性解决方案,并且对CL-PKE加密体制的拒绝解密攻击进行了研究。