完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Hsu, Chien-Lung | |
dc.contributor.author | Wu, Tzong-Chen | |
dc.date.accessioned | 2009-06-02T06:22:09Z | |
dc.date.accessioned | 2020-05-25T06:37:50Z | - |
dc.date.available | 2009-06-02T06:22:09Z | |
dc.date.available | 2020-05-25T06:37:50Z | - |
dc.date.issued | 2006-10-27T06:35:54Z | |
dc.date.submitted | 2000-12-08 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/2698 | - |
dc.description.abstract | Wang,Lin and Chang(1998)proposed two threshold signature schemers, one is with a mutually trusted center and the other is not, that provide the ability to trace back who the participant signers are involved in the construction of the group signature for a given message if necessary. Lately, Tseng and Jan (1999) demonstrated two outsider forgery attacks on the Wang-Lin-Chang schemes. In this paper, we will demonstrate two insider forgery attacks on the Wang-Lin-Chang schemes. That is, any malicious participant signer can successfully forge a valid group signature for an arbitrarily chosen message by himself. | |
dc.description.sponsorship | 中正大學,嘉義縣 | |
dc.format.extent | 3p. | |
dc.format.extent | 189905 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | zh_TW | |
dc.relation.ispartofseries | 2000 ICS會議 | |
dc.subject.other | Cryptanalysis | |
dc.title | Insider Forgery Attacks on Wang-Lin-Chang Threshold Signature Schemes With Traceable Signers | |
分類: | 2000年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics002000000086.pdf | 185.45 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。