Malicious node uses protocol loophole launching collusion attack, it badly affects the normal operation of network.
恶意节点利用协议漏洞发起合谋攻击,将严重影响网络的正常运行。
参考来源 - Ad Hoc网络中合谋攻击研究综述But in the existing threshold signature scheme, conspiracy attack is still a problem which is difficult to solve.
但在现有的门限签名方案中,合谋攻击一直是一个难以解决的问题。
参考来源 - 抗合谋攻击的门限签名方案The scheme can withstand the conspiracy attack.
该方案不仅能抵抗合谋攻击,而且可以根据需要,方便地回收部分代理人的签名权。
参考来源 - 秘密共享及其在代理签名中的应用·2,447,543篇论文数据,部分数据来源于NoteExpress
该方案具有可验证性和防止内部成员合谋攻击;
The scheme has the property of verification and can prevent inside member conspiracy attack.
该方案不仅缩短了码长,而且可以抵抗多种合谋攻击。
It shortens code length, and can counteract multi-collusion attacks.
当其检测出合谋攻击后,启动安全验证对合谋攻击进行处理。
Otherwise, when it detects colluded attacks, it goes into the secure validation phase to further process.
应用推荐