English  |  正體中文  |  简体中文  |  Items with full text/Total items : 56568/90363 (63%)
Visitors : 11872723      Online Users : 58
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/95770


    Title: Li等學者一般化代理簽章法的安全分析 Cryptanalysis of Li et al.'s Generalization of Proxy Signature Schemes
    Authors: 黃心嘉;詹景中
    Contributors: 淡江大學資訊工程學系
    Keywords: 代理簽章法;代理門檻簽章法;多人代理簽章法;多人代理多人簽章法;數位簽章;Proxy signature scheme;Proxy threshold signature scheme;Multi-proxysignature scheme;Multi-proxy multi-signature scheme;Digitalsignature
    Date: 2003-12
    Issue Date: 2014-02-13
    Abstract: 近來Li等學者提出代理簽章的一般化簽署法,然而Li等學者提出方法具有一個共 同的安全弱點。在Li等學者方法中,攻擊者事先攔截某一代理群為其所代理的原 始簽章群所產生的代理簽章,攻擊者便可以偽造出相同於攔截訊息的代理簽章, 讓偽造的代理簽章看起來像是該代理群為攻擊者所簽署的代理簽章。
    Recently, Li et al. proposed their generalization of proxy signature schemes. However, all of Li et al.'s schemes have a common security weakness. In Li et al.'s schemes, an adversary first intercepts a valid proxy signature generated by a proxy group on behalf of the proxy group G/sub p/. From the intercepted proxy signature, the adversary can forge illegal proxy signatures being like generated by the proxy group on behalf of an adversary.
    Relation: 2003年全國計算機會議論文集 (Ⅲ):二十一世紀資訊時代的挑戰=Proceedings of 2003 National Computer Symposium (Ⅲ),頁1321-1324
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Proceeding

    Files in This Item:

    File Description SizeFormat
    Li等學者一般化代理簽章法的安全分析 Cryptanalysis of Li et al.'s Generalization of Proxy Signature Schemes_中文摘要.docx摘要19KbMicrosoft Word112View/Open
    Li等學者一般化代理簽章法的安全分析 Cryptanalysis of Li et al.'s Generalization of Proxy Signature Schemes_英文摘要.docx摘要19KbMicrosoft Word106View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback