完整後設資料紀錄
DC 欄位語言
dc.contributor.authorHsu, Chien-Lung
dc.contributor.authorWu, Tzong-Chen
dc.date.accessioned2009-06-02T06:22:09Z
dc.date.accessioned2020-05-25T06:37:50Z-
dc.date.available2009-06-02T06:22:09Z
dc.date.available2020-05-25T06:37:50Z-
dc.date.issued2006-10-27T06:35:54Z
dc.date.submitted2000-12-08
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/2698-
dc.description.abstractWang,Lin and Chang(1998)proposed two threshold signature schemers, one is with a mutually trusted center and the other is not, that provide the ability to trace back who the participant signers are involved in the construction of the group signature for a given message if necessary. Lately, Tseng and Jan (1999) demonstrated two outsider forgery attacks on the Wang-Lin-Chang schemes. In this paper, we will demonstrate two insider forgery attacks on the Wang-Lin-Chang schemes. That is, any malicious participant signer can successfully forge a valid group signature for an arbitrarily chosen message by himself.
dc.description.sponsorship中正大學,嘉義縣
dc.format.extent3p.
dc.format.extent189905 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2000 ICS會議
dc.subject.otherCryptanalysis
dc.titleInsider Forgery Attacks on Wang-Lin-Chang Threshold Signature Schemes With Traceable Signers
分類:2000年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002000000086.pdf185.45 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。