此外,该方案能够抵抗合谋攻击。
Furthermore, the proposed scheme can withstand conspiracy attack.
该方案具有可验证性和防止内部成员合谋攻击;
The scheme has the property of verification and can prevent inside member conspiracy attack.
该方案不仅缩短了码长,而且可以抵抗多种合谋攻击。
It shortens code length, and can counteract multi-collusion attacks.
当其检测出合谋攻击后,启动安全验证对合谋攻击进行处理。
Otherwise, when it detects colluded attacks, it goes into the secure validation phase to further process.
安全性分析表明该方案能够防止明文攻击、合谋攻击和伪造攻击。
The security analysis shows it can prevent plaintext attack, conspiracy attack and forging attack.
但在现有的门限签名方案中,合谋攻击一直是一个难以解决的问题。
But in the existing threshold signature scheme, conspiracy attack is still a problem which is difficult to solve.
介绍了数字指纹技术的基本原理、工作方式,以及其抵抗合谋攻击特性。
The paper introduces the basic theory, working mode and the capbility of resisting collusion of digital fingerprinting.
分析显示两个方案均能抵抗任何人(包括KGC)的伪造攻击和合谋攻击。
Analysis results show the two schemes can resist any forgery attacks and conspired attacks (including KGC).
无线传感器网络在应用二元多项式密钥预分配协议时,通常容易遭受到敌方的合谋攻击。
Wireless Sensor Network (WSN) was usually vulnerable to conspiracy attack from its adversaries when using bivariate polynomial key pre-distribution protocol.
改进后的方案具有不可否认性,不使用安全信道,以及抵抗公钥替换攻击和合谋攻击等优点。
Improved schemes have advantages of nonrepudiation, using insecure channel, against the public key substitution attack and collusion attack etc.
同时该方案能有效地抵抗重放攻击,伪造攻击,猜测和窃取攻击,扮演攻击及用户合谋攻击等。
Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.
在分析的基础上,有效地将群签名与门限群签名技术融合在一起,提出了一个能抵抗合谋攻击的门限群签名方案。
Though the analysis and combining group signature technology to threshold based group signature scheme, a threshold based group signature scheme with against conspiracy attack was proposed.
该方案指纹生成容易,能够在很大程度上缩减指纹长度,并且能够抵抗多种常见的合谋攻击,有效地跟踪到合谋用户。
In our design, the fingerprint is easy to generate, the length of which is greatly reduced. It can resist many usual collusion attacks and trace the users in collusion efficiently.
通过实验,验证了本文提出的指纹编码方案及指纹系统方案在一般的多用户合谋攻击下能够有效地对合谋用户进行跟踪。
The experiment verified that our fingerprint-coding scheme has good capability to trace users who attacked the system by collusion in usual ways.
方案具有可验证性.且签名的长度不随签名者的人数线性增长,并能抵抗各种内部合谋攻击,具有更高的实用性和安全性。
It is a verifiable scheme, and the size of the scheme doesn"t increase with signer number. The scheme could resist all kinds of collusion, which makes it more practicable and safer."
对张劼等人提出的一类可验证的门限签名方案进行了安全性分析,发现它存在安全漏洞,容易受到合谋攻击和伪造攻击,并且不具备不可否认性。
Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.
理论分析和实验结果表明,改进的指纹方案提高了追踪到至少一个线性组合攻击合谋者的概率。
The theoretical analysis and experimental results demonstrate that the improved scheme increases the probability of tracing at least one colluder who uses linear combination attack.
攻击节点捕获网络中正常路由分组,通过“隧道”将其传输给另一端合谋节点,合谋节点再将该分组重放到网络中。
One attack node catches the routing packet in network and then transmits it to colluding node through "Tunnel". Colluding node retransmit the packet into the network directly.
本文提出的主动路径探测机制能有效地识别系统中发动前驱攻击的合谋成员,并且保证发送者的匿名性。
In this paper, a strategy based on active path detection mechanism is proposed, which ping the every intermediators of the rerouting path by nested-encryption message.
本文提出的主动路径探测机制能有效地识别系统中发动前驱攻击的合谋成员,并且保证发送者的匿名性。
In this paper, a strategy based on active path detection mechanism is proposed, which ping the every intermediators of the rerouting path by nested-encryption message.
应用推荐