A forgery attack is presented on the self-certified signature scheme.
本文对一种自证明签名方案实施了伪造攻击。
Improved scheme has advantages of nonrepudiation, against he original signer's forgery attack and public key substitution attack etc.
改进的方案具有不可否认性,以及抵抗原签名人的伪造攻击和公钥替换攻击等优点。
However, their scheme is insecure by presenting a forgery attack, any receiver can impersonate the proxy signer to sign any message without holding the responsibility.
该文给出的一种攻击方案表明他们的方案是不安全的,任何代理签名的接收者都可以假冒代理人对任意的消息生成有效的签名。
Through the analysis of two proxy blind signature schemes, we want to prove that this two proxy blind signature schemes can not resist forgery attack and both have linkability.
对两个代理盲签方案及其安全性进行分析,证明了这两个方案不具有不可伪造性和不可链接性。
Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.
同时该方案能有效地抵抗重放攻击,伪造攻击,猜测和窃取攻击,扮演攻击及用户合谋攻击等。
Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack.
给出了对一个已有的高效无证书签名方案的替换公钥攻击,表明了在该方案中,攻击者可以通过替换签名者公钥伪造签名;进而针对该攻击提出了改进方案。
Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.
对张劼等人提出的一类可验证的门限签名方案进行了安全性分析,发现它存在安全漏洞,容易受到合谋攻击和伪造攻击,并且不具备不可否认性。
After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.
通过对黄辉等人提出的代理盲签名方案的分析,指出该方案不满足不可伪造性,原始签名者和签名接收者都可以伪造代理签名者的盲签名。
When this tag is placed with an XSS attack - which are the most common of the documented attacks - users can easily do something with their credentials without knowing it - thus, the forgery.
当此标记与XSS攻击结合在一起时—在已归档的攻击中最常见—用户可以在不知情的情况下轻松地对其凭证执行一些操作—因此是伪造的。
Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signer's forgery and public key substitution attack.
此外,该方案不仅满足代理签名的基本性质,还避免了代理权滥用、原始签名人伪造和公钥替换攻击。
These weak points can result in the adversary to cheat the verification group by forgery and substitution attack.
这样的漏洞使得敌手可利用伪造攻击和替换攻击对验证组进行欺骗;
These weak points can result in the adversary to cheat the verification group by forgery and substitution attack.
这样的漏洞使得敌手可利用伪造攻击和替换攻击对验证组进行欺骗;
应用推荐