forge a signature

英 [fɔːdʒ ə ˈsɪɡnətʃə(r)] 美 [fɔːrdʒ ə ˈsɪɡnətʃər]

伪造签名

法律



双语例句

  1. A dishonest PKG could forge a valid partially blind signature.
    不诚实的PKG可以伪造一个有效的部分盲签名。
  2. Donald is force to forge a signature.
    唐纳德被迫伪造签字。
  3. A new method against brand forge and a practical JAVA digital signature cryptosystem are proposed in this paper.
    本文提出了一种全新的商标防伪方法并设计了对应的JAVA数字签名密码系统。
  4. George was forced to forge a signature.
    乔治被迫伪造签名。
  5. Palermo defender Simon Kjaer has admitted that he hopes to forge a successful defensive partnership with Daniel Agger if Liverpool win the race for his signature.
    巴勒莫后卫西蒙·克亚尔承认他希望能和丹尼尔·阿格组成成功的后防搭档,前提是利物浦能够击败别的对手而签下他。
  6. Because PKG can compute the private key of any user in system, it can forge a blind signature or a proxy signature of any one.
    因为PKG可以计算系统内任何用户的私钥,当然可以伪造任何用户的盲签名和代理签名。
  7. The results show that CA can forge a valid self-certified signature of his client on an arbitrary message by tampering with some parameters of the signature.
    在这种攻击下CA通过改变数字签名中的相关参数,可以对其用户的任意消息伪造自证明签名。
  8. Many proposed digital signature scheme only put the focal point of security on both how to prevent signature receiver to forge a signature and control their verification ability.
    许多已经提出的数字签名方案仅仅把安全问题的重点放在如何防止签名收方对签名的伪造以及控制签名收方验证签名的能力方面。
  9. In this paper we show that the security of the signature scheme proposed in [ 4] is not based on two hard problems ( DLP and FP), we can forge a signature for an arbitrary message if only DLP is solved.
    分析了文献[4]中提出的基于大数分解和离散对数难题的签名方案,指出文献[4]中提出的方案在离散对数可解时即是不安全的。
  10. Both original signer and signature receiver can forge a valid proxy blind signature for any file.
    原始签名者或签名接受者能伪造任何文件的代理盲签名。
  11. An adversary with infinite computing ability can forge a partial blind signature that can be verified, but it can be easily found.
    具有无穷计算能力的攻击者,虽然能够成功伪造一个可通过验证的签名,但是伪造的签名很容易被发现。
  12. It is shown that the attacker can forge a signature if and if he can solve the root extraction problem defined over braid groups.
    从辫群上求根问题的困难性出发构造了一个数字签名方案,证明了攻击者能够成功地伪造一个签名当且仅当他能够求解辫群上的求根问题。