完整後設資料紀錄
DC 欄位語言
dc.contributor.authorHwang, Shin-Jia
dc.contributor.authorChan, Ching-Chung
dc.date.accessioned2009-06-02T08:38:24Z
dc.date.accessioned2020-07-05T06:33:17Z-
dc.date.available2009-06-02T08:38:24Z
dc.date.available2020-07-05T06:33:17Z-
dc.date.issued2006-06-09T08:57:43Z
dc.date.submitted2003-12-19
dc.identifier.urihttp://dspace.fcu.edu.tw/handle/2376/1889-
dc.description.abstractRecently, Li et al. proposed their generalization of proxy signature schemes. However, all of Li et al.’s schemes have a common security weakness. In Li et al.’s schemes, an adversary first intercepts a valid proxy signature generated by a proxy group on behalf of the proxy group GP. From the intercepted proxy signature, the adversary can forge illegal proxy signatures being like generated by the proxy group on behalf of an adversary.
dc.description.sponsorship逢甲大學,台中市
dc.format.extent4P.
dc.format.extent210489 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries中華民國92年全國計算機會議
dc.subjectProxy signatures scheme
dc.subjectproxy threshold signature scheme
dc.subjectmulti-proxy signature
dc.subjectproxy multi-signature scheme
dc.subjectmulti-proxy multi-signature scheme
dc.subject代理簽章法
dc.subject.other資訊安全
dc.titleCryptanalysis of Li et al.’s Generalization of Proxy Signature Schemes
dc.title.alternativeLi 等學者一般化代理簽章法的安全分析
分類:2003年 NCS 全國計算機會議

文件中的檔案:
檔案 描述 大小格式 
IS_0352003177.pdf205.56 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。