说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 密钥替换攻击
1)  key substitution attacks
密钥替换攻击
1.
This paper shows that the two short signature schemes provably secure in the standard model are all insecure against key substitution attacks under the multi-user setting,namely an adversary can generate a new public key satisfying legitimate signatures created by the legitimate signer.
针对在标准模型下可证安全的两个短签名方案,该文指出这两个方案在多用户环境下是不安全的,不能抵抗密钥替换攻击,即一个攻击者能够生成一个新公钥满足合法签名者生成的合法签名。
2)  Key Replacement Attack
密钥代替攻击
3)  public-key substitute attack
公钥替换攻击
1.
Through the cryptanalysis of a threshold proxy signature scheme in literature,the scheme could not resist insider attacks and public-key substitute attacks.
对文献的门限代理签名方案进行了密码分析,发现该方案不能抵抗内部攻击和公钥替换攻击。
2.
Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings,it is found that the scheme can t resist forgery attack and public-key substitute attack.
对一种基于双线性对的新型门限代理签名方案进行了密码分析,发现该门限代理签名方案不能抵抗伪造攻击和公钥替换攻击。
3.
Through the cryptanalysis of threshold proxy signature scheme proposed by Huang et al(denoted as HC scheme) recently,it is found that the scheme could not resist frame attacks and public-key substitute attacks.
通过对Huang等人提出的门限代理签名方案(HC方案)进行安全性分析,发现方案不能抵抗框架攻击和公钥替换攻击。
4)  public key replacement attack
替换公钥攻击
1.
That a presented proposal of efficient certificateless signature scheme is insecure against public key replacement attack is demonstrated.
给出了对一个已有的高效无证书签名方案的替换公钥攻击,表明了在该方案中,攻击者可以通过替换签名者公钥伪造签名;进而针对该攻击提出了改进方案。
2.
It is found that the three schemes are all insecure against public key replacement attack.
对最近提出的2个在随机预言模型中可证安全的无证书签名方案和1个在标准模型中可证安全的无证书签名方案进行安全性分析,指出这3个方案不能抵抗替换公钥攻击的安全隐患,在这种攻击下攻击者能够生成新的公钥满足合法签名者生成的合法签名。
3.
The certificateless signature scheme can suffer from public key replacement attack so that any one can forge a valid signature on any message.
该方案能受到替换公钥攻击,以至于任何人都能对任何消息成功伪造签名。
5)  secret key attacking
密钥攻击
6)  substitution attack
替换攻击
1.
Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities P I and P S of a successful impersonation attack and a successful substitution attack, respectively, of this code are also computed.
计算了认证码的参数 ,并在假定按照等概率分布来选择编码规则下 ,计算了成功模仿攻击概率PI 和成功替换攻击概率PS,它们都达到了最优或接近最优 ,为实现一些好的实用认证技术在理论上提供了可靠的基础 ,也给出了构造Cartesian认证码的技巧 。
2.
On assuming that encoding rules are chosen according to a uniform probability distribution,the probabilities of a successful impersonation attack and a successful substitution attack of these codes are also computed respectively.
并在假定按照等概率分布来选择编码规则下,求出了认证码的成功的模仿攻击概率和成功的替换攻击概率。
3.
Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities P I and P S of a successful impersonation attack and a successful substitution attack, respectively, of this code are computed.
计算了认证码的参数 ,并假定按照等概率分布选择编码规则 ,计算了成功模仿攻击概率PI 和成功替换攻击概率PS,它们都达到了最优或接近最优 。
补充资料:三密──佛三密
【三密──佛三密】
  ﹝出大智度论﹞
  密即秘密。谓如来身口意三业,或现通,或说法,或思惟,皆非诸菩萨等之所思议,故名三密。
  [一、身密],谓如来处大会中,众见佛身,或黄金色,或白银色,或杂宝色,或长丈六,或长一里十里,乃至现大神变,皆不可思议,故名身密。
  [二、语密],语密即口密也。谓佛说法之时,或一里外闻佛音声,或十里、或百千万里外闻佛音声。又一会中,或闻说布施,或闻说持戒等,各各随心所闻,皆不可思议,故名语密。
  [三、意密],谓佛常处寂定,凡所思惟观察,皆不可思议,故名意密。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条