1
کامپیوتر و شبکه::
هش رمزنگارانه
To create a new account, a user first generates a fresh verification/signature key-pair (vk, sk) for a signature scheme and uses the cryptographic hash of the public verification key vk as an account address a = H(vk).1 The new account is created in the ledger state when a transaction sent from an existing account invokes the create_account(a) Move instruction.
identified by its cryptographic hash.
The authenticator is formed from the root of a full binary tree created from the strings, labeling leaves as H(i si) and internal nodes as H(left right), where H is a cryptographic hash function (which we will refer to as a hash).6 The function f , which the prover wishes to authenticate, is an inclusion proof that a key-value pair (k, v) is within the map D.
واژگان شبکه مترجمین ایران