1) universal forgery
广义伪造攻击
1.
By analyzing its security,the results shows that the scheme can t prevent adversary from universal forgery,that is,anyone who isn t in a group can forge a membership certificate and a corresponding secret key without group manager s permission.
通过对该方案的安全性进行分析,发现该方案不能抵抗广义伪造攻击,即任何一个非群成员均可以在不经过群经理的许可下,伪造一个群成员的身份证书和相应的秘密密钥;利用这个身份证书和秘密密钥,可以对任意的消息进行签名,签名能够通过验证算法。
2) forgery attack
伪造攻击
1.
Analysis and Forgery Attack to Authorised Group Signature Scheme;
对授权群签名方案的分析及伪造攻击
2.
A new forgery attack on message recovery signatures;
具有消息恢复签名方案的伪造攻击
3.
A class of threshold signature scheme based on ElGamal is improved,in which dealer right can be restricted,it can prevent forgery attack for security.
本文对基于ElGamal体制的一类门限签名方案进行改进,改进后的方案能够限制分发者的权限,防止了伪造攻击,从而提高了安全性能。
3) forge attack
伪造攻击
1.
Based on security analysis on Hsu scheme,an improved threshold proxy signature scheme was proposed,which effectively overcomed the disadvantage of Hsu scheme which couldn t stand the internal conspiracy attack and the forge attack.
在对Hsu等的方案进行安全性分析的基础上,提出了一种改进的门限代理签名方案,该方案有效地克服了Hsu方案不能有效抵抗内部协作伪造攻击的不足。
2.
There is forge attack in the scheme.
分析了一种批量签名的安全性,这种签名是不安全的,签名方案存在伪造攻击。
4) forgery attack
伪造签名攻击
1.
Two forgery attacks and their corresponding conspiracy attacks are proposed against the(t,n) threshold signature scheme without a trusted party worked out by Wang Bin and Li Jian-hua(the WL Scheme for short).
针对王斌和李建华的无可信中心(t,n)门限签名方案(简称王-李方案),给出两种伪造签名攻击及相应的合谋攻击。
2.
The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially,but also provide anonymity and traceability simultaneously.
结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的分布式密钥生成协议保证群私钥的不可知性,因此比现有方案具有更高的安全性。
5) universal forgery attack
无条件伪造攻击
6) message forgery attack
消息伪造攻击
1.
However, this paper, presents a new message forgery attack on TMAC-V by using the property of stochastic collision, it further indica.
文中利用随机消息的碰撞特性,给出了一种新的消息伪造攻击方法,并指出新攻击下TMAC-V工作模式是脆弱的:利用我们的新方法可以成功的进行消息和其MAC的伪造。
2.
This paper proposes a message forgery attack on PMAC mode by using the property of differential equivalent of local operation mode.
针对PMAC工作模式,利用模式局部差分恒等原理,给出一种消息伪造攻击方法,指出新攻击下PMAC工作模式是脆弱的。
补充资料:伪造、出售伪造的增值税专用发票罪
伪造、出售伪造的增值税专用发票罪:指仿照国家增值税专用发票的式样,使用各种方法非法制造假增值税专用发票冒充真增值税发票或者出售伪造的假增值税专用发票的行为。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条