搜索结果: 1-2 共查到“军事学 threshold signatures”相关记录2条 . 查询时间(0.125 秒)
Distributed SSH Key Management with Proactive RSA Threshold Signatures
distributed cryptography implementation RSA secret sharing
2018/5/2
SSH is a security network protocol that uses public key cryptography for client authentication. SSH connections are designed to be run between a client and a server and therefore in enterprise network...
Generic On-line/Off-line Threshold Signatures
On-line/Off-line Signature Schemes Threshold Cryptography Chameleon Hash Functions
2009/3/17
We present generic on-line/off-line threshold signatures, in
which the bulk of signature computation can take place “off-line” during
lulls in service requests [6]. Such precomputation can help syst...