threshold cryptography

threshold cryptography
  1. пороговая криптография

 

пороговая криптография
Разбиение тайны (например, секретного ключа) на части таким образом, что только по некоторым подмножествам n частей можно восстановить тайну.
[http://www.morepc.ru/dict/]

Тематики

  • информационные технологии в целом

EN

  • threshold cryptography


Англо-русский словарь нормативно-технической терминологии. . 2015.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "threshold cryptography" в других словарях:

  • Threshold cryptosystem — In cryptography, a cryptosystem is called a threshold cryptosystem , if in order to decrypt an encrypted message a number of parties exceeding a threshold is required to cooperate in the decryption protocol. The message is encrypted using a… …   Wikipedia

  • Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Quantum cryptography — Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt… …   Wikipedia

  • Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… …   Wikipedia

  • Neural cryptography — is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially neural network algorithms, for use in encryption and cryptanalysis. Contents 1 Definition 2 Applications 3 Neural key e …   Wikipedia

  • DisCSP — Distributed Constraint Satisfaction Problems (DisCSPs) are a form of constraint satisfaction problems.Distributed Constraint Satisfaction is a framework for describing a problem in terms of constraints that are known and enforced by distinct… …   Wikipedia

  • International Technology Alliance — The International Technology Alliance (ITA) is a research program initiated by the UK Ministry of Defence (United Kingdom) (MoD) and the US Army Research Laboratory (ARL). The research program is intended to run for 10 years. Its full name is… …   Wikipedia

  • пороговая криптография — Разбиение тайны (например, секретного ключа) на части таким образом, что только по некоторым подмножествам n частей можно восстановить тайну. [http://www.morepc.ru/dict/] Тематики информационные технологии в целом EN threshold cryptography …   Справочник технического переводчика

  • Knapsack problem — BKP redirects here. For other uses, see BKP (disambiguation). Example of a one dimensional (constraint) knapsack problem: which boxes should be chosen to maximize the amount of money while still keeping the overall weight under or equal to… …   Wikipedia

  • Distributed key generation — For some protocols no party should be in the sole possession of the secret key. Rather, during distributed key generation every party obtains a share of the key. A threshold of the participating parties need to cooperate in order to achieve a… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»