1) cooperative attacking
合作攻击
2) conspiracy attack
合谋攻击
1.
Two forgery attacks and their corresponding conspiracy attacks are proposed against the(t,n) threshold signature scheme without a trusted party worked out by Wang Bin and Li Jian-hua(the WL Scheme for short).
针对王斌和李建华的无可信中心(t,n)门限签名方案(简称王-李方案),给出两种伪造签名攻击及相应的合谋攻击。
2.
A novel conspiracy attack immune(t,n) threshold signature scheme with traceability was proposed to overcome the weaknesses of the Wang-Li scheme and the improved Xie-Yu scheme.
在分析王斌和李建华的无可信中心门限签名方案(王-李方案)以及X ie-Yu改进方案安全缺陷的基础上,提出了一种新的具有可追查性的抗合谋攻击(t,n)门限签名方案;对新方案的安全性进行了分析,并与现有方案的效率进行了比较。
3.
But in the existing threshold signature scheme,conspiracy attack is still a problem which is difficult to solve.
但在现有的门限签名方案中,合谋攻击一直是一个难以解决的问题。
3) coalition attack
联合攻击
1.
They considerd their scheme possible to satisfy multed security requirements to resisit coalition attacks.
1998年Lysyanskaya和Ramzan在国际金融密码会议(FC98)上,将群签名和盲签名结合起来提出第一个群盲签名方案(Lys98),他们认为该方案能够满足抗联合攻击等多种安全需求。
2.
And the scheme does not satisfy the properties of against coalition attack.
对司光东等人提出的一种改进的群签名方案进行安全性分析,指出该方案是不安全的:群管理员不能够打开一个群签名,该群签名是不可跟踪的;群管理员可以伪造一个能通过验证的群签名;同时该方案并不能抵抗联合攻击,两个群成员合谋后可以伪造出有效的群签名。
3.
A coalition attack that the manager and the revocation center could conspire to generate valid group signatures and impose them on an arbitrary member of the group was presented.
分析了张健红等人提出的高效群签名方案的安全性缺陷,撤销中心不能够打开一个有效的群签名,因此,群签名是不可跟踪的;其次,给出了对该群签名的一种联合攻击,群管理员和撤销中心合谋后可以任意产生有效的群签名并把它强加给任一群成员。
4) collusion
[英][kə'lu:ʒn] [美][kə'luʒən]
合谋攻击
1.
The paper introduces the basic theory, working mode and the capbility of resisting collusion of digital fingerprinting.
介绍了数字指纹技术的基本原理、工作方式 ,以及其抵抗合谋攻击特性 。
5) collusion attack
合谋攻击
1.
It can resist the collusion attack and can be realized in a public channel.
提出了一个新的安全高效的不可否认门限代理签名方案,新方案克服了原方案的缺点,不仅能够抵抗内部攻击、公钥替换攻击和合谋攻击,而且满足安全门限代理签名方案的安全要求,可以在公开信道中进行。
2.
Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen,concluded it not only exist collusion attack and forgery attack,but have no undeniability.
对张劼等人提出的一类可验证的门限签名方案进行了安全性分析,发现它存在安全漏洞,容易受到合谋攻击和伪造攻击,并且不具备不可否认性。
3.
It shortens code length,and can counteract multi-collusion attacks.
该方案不仅缩短了码长,而且可以抵抗多种合谋攻击。
6) multi-step attack
复合攻击
1.
Forecast algorithm for multi-step attack based on attack intention;
基于攻击意图的复合攻击预测方法研究
2.
They are multi-step attacks which are composed by a set of attack actions.
通过对复合攻击模式的深入研究,提出了一种基于攻击意图检测和预测复合攻击的方法。
3.
The multi-step attack is one of the primary forms of the current intrusions.
复合攻击是网络入侵的主要形式之一。
补充资料:合谋
合谋——
合谋指行为人意图影响市场行情而与他人同谋,由一方作出交易委托,另一方按对方委托的内容,在同一时间、地点,以同等数量和价格反向委托,并达成交易的行为。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条