But the scheme 1 does not provide asymmetry (non-repudiation) and the scheme 2 does not resist collusion attack.
但方案1不能够提供非对称性(防抵赖性),方案2不能够抵抗共谋攻击。
The standard deviation and concentration ratio of local evaluation was used to identify and control collusion attack.
采用基于局部评价标准差、局部评价集中度的方法识别和抑制共谋攻击;
Improved schemes have advantages of nonrepudiation, using insecure channel, against the public key substitution attack and collusion attack etc.
改进后的方案具有不可否认性,不使用安全信道,以及抵抗公钥替换攻击和合谋攻击等优点。
Proposed a pay-TV scheme with user revocation, but it is a private-key scheme, also it does not provide multiple-service capability and meantime can not resist collusion attack.
Mu等人提出了一个可撤销用户的付费电视方案,但其方案是私钥方案,并且没有提供多服务的功能,同时也不能抵抗共谋攻击。
Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.
同时该方案能有效地抵抗重放攻击,伪造攻击,猜测和窃取攻击,扮演攻击及用户合谋攻击等。
Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.
对张劼等人提出的一类可验证的门限签名方案进行了安全性分析,发现它存在安全漏洞,容易受到合谋攻击和伪造攻击,并且不具备不可否认性。
There are also worries about the possibility of tacit collusion among large patent-holders, who might attack individual inventors in order to keep them out of specific markets.
也有人担心大型的专利持有集团勾结起来攻击个人的发明者,以把他们赶出某个市场。
At present, there are three kinds of traitor tracing schemes against collusion key attack, which are symmetrical traitor tracing schemes and dissymmetrical traitor tracing schemes;
目前,对抗共谋密钥攻击的叛徒追踪方案主要有对称追踪方案、非对称追踪方案、门限追踪方案;
At present, there are three kinds of traitor tracing schemes against collusion key attack, which are symmetrical traitor tracing schemes and dissymmetrical traitor tracing schemes;
目前,对抗共谋密钥攻击的叛徒追踪方案主要有对称追踪方案、非对称追踪方案、门限追踪方案;
应用推荐