In our protocol we use the efficient and provable secure certificateless signature scheme [3] to sign the exchanged messages, so the adversary is prevented from replacing them by some other messages.

  • 在该协议中运用了[3]所提供的无证书签名方案对传输的信息进行签名,以阻止对所传输的信息进行替换攻击。
目录 查词历史