• A forgery attack is presented on the self-certified signature scheme.

    本文种自证明签名方案实施了伪造攻击

    youdao

  • Improved scheme has advantages of nonrepudiation, against he original signer's forgery attack and public key substitution attack etc.

    改进方案具有不可否认性,以及抵抗签名人伪造攻击公钥替换攻击优点

    youdao

  • However, their scheme is insecure by presenting a forgery attack, any receiver can impersonate the proxy signer to sign any message without holding the responsibility.

    该文给出一种攻击方案表明他们的方案不安全任何代理签名接收者可以假冒代理人任意消息生成有效的签名。

    youdao

  • Through the analysis of two proxy blind signature schemes, we want to prove that this two proxy blind signature schemes can not resist forgery attack and both have linkability.

    代理方案及其安全性进行分析证明两个方案具有不可伪造不可链接性。

    youdao

  • Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.

    同时方案有效地抵抗攻击伪造攻击,猜测窃取攻击,扮演攻击用户合谋攻击等。

    youdao

  • Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack.

    给出了一个已有的高效无证书签名方案替换公钥攻击表明了在方案中,攻击者可以通过替换签名者公钥伪造签名;进而针对该攻击提出了改进方案。

    youdao

  • Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.

    劼等提出的一类可验证的门限签名方案进行了安全性分析,发现存在安全漏洞,容易受到合谋攻击伪造攻击,并且具备不可否认性。

    youdao

  • After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.

    通过黄辉等人提出代理签名方案的分析,指出方案不满足不可伪造性,原始签名者签名接收者都可以伪造代理签名者的盲签名。

    youdao

  • When this tag is placed with an XSS attack - which are the most common of the documented attacks - users can easily do something with their credentials without knowing it - thus, the forgery.

    标记XSS攻击结合一起时—在已归档攻击常见用户可以知情情况下轻松地凭证执行一些操作—因此是伪造的。

    youdao

  • Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signer's forgery and public key substitution attack.

    此外方案不仅满足代理签名基本性质,还避免了代理权滥用原始签名伪造公钥替换攻击。

    youdao

  • These weak points can result in the adversary to cheat the verification group by forgery and substitution attack.

    这样漏洞使得敌手可利用伪造攻击替换攻击验证进行欺骗

    youdao

  • These weak points can result in the adversary to cheat the verification group by forgery and substitution attack.

    这样漏洞使得敌手可利用伪造攻击替换攻击验证进行欺骗

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定