进一步利用零知识的思想给出了抵抗公钥替换攻击的一般方法。
Furthermore, using zero knowledge idea, a general approach to withstanding the public key substitution attack is given.
改进的方案具有不可否认性,以及抵抗原签名人的伪造攻击和公钥替换攻击等优点。
Improved scheme has advantages of nonrepudiation, against he original signer's forgery attack and public key substitution attack etc.
改进后的方案具有不可否认性,不使用安全信道,以及抵抗公钥替换攻击和合谋攻击等优点。
Improved schemes have advantages of nonrepudiation, using insecure channel, against the public key substitution attack and collusion attack etc.
这里指出s - L - H方案不能抵抗公钥替换攻击,并给出了一个改进的门限代理签名方案。
It is shown here that S-L-H scheme is insecure against the public key substitution attack and an improved threshold proxy signature scheme is proposed.
此外,该方案不仅满足代理签名的基本性质,还避免了代理权滥用、原始签名人伪造和公钥替换攻击。
Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signer's forgery and public key substitution attack.
对无证书代理签名方案进行安全性分析,指出该方案对于公钥替换攻击是不安全的,并给出具体的攻击方法。
This paper analyzes the security of a certificateless proxy signature scheme and shows that it is insecure against the public key replacement attack in certificateless cryptosystems.
对一种基于双线性对的新型门限代理签名方案进行了密码分析,发现该门限代理签名方案不能抵抗伪造攻击和公钥替换攻击。
Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks.
安全分析结果表明,与L - L - C - Z门限代理签密协议相比,该改进门限代理签密协议能够承受接收方公钥替换攻击。
Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.
该方案能受到替换公钥攻击,以至于任何人都能对任何消息成功伪造签名。
The certificateless signature scheme can suffer from public key replacement attack so that any one can forge a valid signature on any message.
给出了对一个已有的高效无证书签名方案的替换公钥攻击,表明了在该方案中,攻击者可以通过替换签名者公钥伪造签名;进而针对该攻击提出了改进方案。
Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack.
给出了对一个已有的高效无证书签名方案的替换公钥攻击,表明了在该方案中,攻击者可以通过替换签名者公钥伪造签名;进而针对该攻击提出了改进方案。
Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack.
应用推荐