merkle

  • 网络默克尔;默克勒
merklemerkle
  1. Mobile Agent Route Protection Based on Merkle Trees and Its Extension

    基于Merkle树的安全移动代理路由协议及其推广

  2. Research on Merkle Authentication Tree Traverse and the Application in Digital Signature

    Merkle可信树遍历算法及在数字签名上的应用研究

  3. Meanwhile the increasing of traffic is reduced by using Merkle hash tree .

    同时利用Merkle树进一步减少批处理方案中通信量增长的不足。

  4. This encryption scheme will be applied to the Merkle authentication tree signature .

    之后将这种加密方案应用于Merkle可信树数字签名中。

  5. To preserve integrity , we adopt Merkle hash tree to verify the correctness of query results .

    为了保护查询结果的完整性,采用Merkle哈希树对查询结果的完整性进行认证。

  6. The first attribution of this paper is proposing a new One-time Signature scheme which is improved by Merkle Tree .

    本文的第一个工作是提出使用Merkle树来改进一次签名方案。

  7. Second , to guarantee the data privacy , an approach based on the use of encryption and Merkle hash tree techniques is proposed .

    其次,为了保证数据的安全,提出了基于加密和Merkle哈希树的方法。

  8. The author uses Merkle tree to distribute these authentication keys , and this way greatly reduces the number of authentication keys .

    利用Merkle树完成认证密钥的分发,大大减少认证密钥的数量。

  9. Then Merkle hash tree is introduced to extend the capabilities of this access control scheme so that the node storage costs are reduced .

    引入Merkle哈希树,对此访问控制方式进行扩展,增加其可扩展性,并减少节点存储开销。

  10. Today , Merkle tree structure has been widely applied to many security fields , such as certificate revocation , multicast source authentication , group key agreement and so on .

    如今,Merkle可信树的树形结构已经被广泛应用到了信息安全的各个领域,比如证书撤销、源组播认证、群密钥协商等等。

  11. Based on this protocol , using hash function , a security itinerary protection of mobile agent based on Merkle trees is proposed . Security and computational complexity are discussed in detail .

    在此协议的基础上,利用hash函数,提出了一个基于Merkle树的移动agent动态安全迁移协议,并对其安全性和计算复杂度进行了详细的分析。

  12. Then a Merkle Hash tree is built for each subgroup of packets , and the Hash value of every root is appended to preceding packets to form Hash chains .

    然后为每个子组内的报文建立一棵Hash树,并将每棵Hash树的树根附加于之前的若干个报文中,从而构成了Hash链。

  13. By inserting in the query response one Merkle hash value generated by the owner and some other hash values , a user is able to locally verify the authenticity of the query response .

    通过向查询结果中插入由拥有者产生的Merkle哈希值以及一些辅助哈希值,用户能够在本地验证查询结果的可靠性。

  14. This is the first time that Merkle authentication tree signatures and identity-based authentication mechanism is combined , it is to improve the flaws that Merkle authentication tree signature can not be authenticated .

    通过将基于身份认证机制应用于Merkle可信树数字签名的方法,改进了Merkle可信树数字签名中缺乏身份认证的缺陷。

  15. In addition , this paper improves the security of the Merkle authentication tree signature which should not resist an attacker to replay attacks . A dynamic Merkle authentication tree signature scheme is presented .

    此外,本文在安全性上改进了Merkle可信树数字签名不能抵抗攻击者进行重放攻击的缺陷。

  16. Secondly , this thesis introduces algorithms of hash chain , TESLA and Merkle tree , and proposes the authentication and security protocol of deployment , data sending and receiving in the lightweight wireless sensor networks .

    其次,本论文引入了hashchain算法、TESLA算法和Merkletree算法,提出了轻量散投的无线传感器网络部署的安全认证协议、数据发送和接收的安全认证协议。

  17. Merkle authentication tree is arose to solve authentication problem in the one time signature , Merkle authentication tree have remarkable advantages in authentication , because it can authenticate a lot of data using only one signature .

    Merkle可信树正是为了解决多重一次签名中的认证问题而产生的,Merkle可信树结构具有一次签名大量认证的优点,在认证方面具有显著的优势。

  18. One-time Signature is a type of signature scheme which is very fast based on one way function without trapdoor . Together with Merkle Tree , One-time Signature can be used to construct a solution to Multicast Source Authentication problem .

    一次签名是一类基于无陷门单向函数的快速的数字签名,结合使用Merkle树来进行密钥管理,可用来构造组播源认证方案。

  19. DMSS-Dynamic Merkle Authentication-tree Signature

    DMSS-动态Merkle可信树签名方案

  20. Besides that , the security of Merkle authentication tree signature is only dependent on the security of hash function , and it is not needed too much theories and assumptions , which makes the Merkle authentication tree signature more secure and practical .

    并且基于Merkle可信树的数字签名方案在安全性上仅仅依赖于哈希函数的安全性,且不需要太多的理论假设,这使得基于Merkle可信树的数字签名更加安全、实用。

  21. Since Shamir designed an algorithm attacking successfully the Ralph Merkle and Martin Hellman 's knapsack cryptosystem , the algorithm of the knapsack cryptosystem has been improved such that it can not be attacked by Shamir 's attacking .

    自从Shamir提出攻击RalphMerkle和MartinHellman背包密码系统的算法以来,背包密码系统在算法设计上进行了改进,使其在改进后能抵挡Shamir攻击。