1
کامپیوتر و شبکه::
رمزنگاری، رمزنگارانه
Cryptographic authen- tication techniques employ cryptography primitives such as digital signature or MAC (Message Authentication Code) to ensure data authenticity [31]-[33]; Watermarking-based authentication schemes embed a reference object (e.g.
generic authentication process is similar to the cryptographic
As the present scheme adopts the symmetric key system, hence its computational cost is low at the center, AP and train, in comparison with scheme [32] which adopts asymmetric key cryptographic primitives.،The Libra Blockchain is a cryptographically authenticated database [7, 8, 9] maintained using the Libra protocol.
To create a new account, a user first generates a fresh verification/signature key-pair (vk, sk) for a signature scheme and uses the cryptographic hash of the public verification key vk as an account address a = H(vk).1 The new account is created in the ledger state when a transaction sent from an existing account invokes the create_account(a) Move instruction.
identified by its cryptographic hash.
Without this check, the VM would erroneously accept a transaction with a cryptographically valid signature even though there is no correspondence to the key that is associated with the account.
The authenticator is formed from the root of a full binary tree created from the strings, labeling leaves as H(i si) and internal nodes as H(left right), where H is a cryptographic hash function (which we will refer to as a hash).6 The function f , which the prover wishes to authenticate, is an inclusion proof that a key-value pair (k, v) is within the map D.
واژگان شبکه مترجمین ایران