1) Common forgery attack
联合伪造攻击
2) forgery attack
伪造攻击
1.
Analysis and Forgery Attack to Authorised Group Signature Scheme;
对授权群签名方案的分析及伪造攻击
2.
A new forgery attack on message recovery signatures;
具有消息恢复签名方案的伪造攻击
3.
A class of threshold signature scheme based on ElGamal is improved,in which dealer right can be restricted,it can prevent forgery attack for security.
本文对基于ElGamal体制的一类门限签名方案进行改进,改进后的方案能够限制分发者的权限,防止了伪造攻击,从而提高了安全性能。
3) forge attack
伪造攻击
1.
Based on security analysis on Hsu scheme,an improved threshold proxy signature scheme was proposed,which effectively overcomed the disadvantage of Hsu scheme which couldn t stand the internal conspiracy attack and the forge attack.
在对Hsu等的方案进行安全性分析的基础上,提出了一种改进的门限代理签名方案,该方案有效地克服了Hsu方案不能有效抵抗内部协作伪造攻击的不足。
2.
There is forge attack in the scheme.
分析了一种批量签名的安全性,这种签名是不安全的,签名方案存在伪造攻击。
4) coalition attack
联合攻击
1.
They considerd their scheme possible to satisfy multed security requirements to resisit coalition attacks.
1998年Lysyanskaya和Ramzan在国际金融密码会议(FC98)上,将群签名和盲签名结合起来提出第一个群盲签名方案(Lys98),他们认为该方案能够满足抗联合攻击等多种安全需求。
2.
And the scheme does not satisfy the properties of against coalition attack.
对司光东等人提出的一种改进的群签名方案进行安全性分析,指出该方案是不安全的:群管理员不能够打开一个群签名,该群签名是不可跟踪的;群管理员可以伪造一个能通过验证的群签名;同时该方案并不能抵抗联合攻击,两个群成员合谋后可以伪造出有效的群签名。
3.
A coalition attack that the manager and the revocation center could conspire to generate valid group signatures and impose them on an arbitrary member of the group was presented.
分析了张健红等人提出的高效群签名方案的安全性缺陷,撤销中心不能够打开一个有效的群签名,因此,群签名是不可跟踪的;其次,给出了对该群签名的一种联合攻击,群管理员和撤销中心合谋后可以任意产生有效的群签名并把它强加给任一群成员。
5) collusion attack
联合攻击
1.
This new scheme not only solves the problem that QCX scheme has not the property of strong identifiablity through introducing the set ASI in the threshold proxy signature but also overcomes the security leaks such as collusion attack,the original forgeable attack in the congener schemes.
该方案通过在门限代理签名中引入实际参与签名的t个代理签名人的身份标志集合,解决了原有方案中门限代理签名方案中不具备强可识别性的问题;并利用双线性对的优点,克服了同类方案中存在的不能抵抗联合攻击和原始签名人伪造攻击等安全漏洞。
6) forgery attack
伪造签名攻击
1.
Two forgery attacks and their corresponding conspiracy attacks are proposed against the(t,n) threshold signature scheme without a trusted party worked out by Wang Bin and Li Jian-hua(the WL Scheme for short).
针对王斌和李建华的无可信中心(t,n)门限签名方案(简称王-李方案),给出两种伪造签名攻击及相应的合谋攻击。
2.
The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially,but also provide anonymity and traceability simultaneously.
结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的分布式密钥生成协议保证群私钥的不可知性,因此比现有方案具有更高的安全性。
补充资料:伪造、出售伪造的增值税专用发票罪
伪造、出售伪造的增值税专用发票罪:指仿照国家增值税专用发票的式样,使用各种方法非法制造假增值税专用发票冒充真增值税发票或者出售伪造的假增值税专用发票的行为。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条