If we use exponentiation to encrypt or decrypt , the adversary can use logarithm to attack .
如果我们运用求幂运算来加密和解密,对手就可以运用对数进行攻击.
Read and analysis for the advanced research papers : fast exponentiation computation , multisignature , proxy signature , threshold signature , group signature , identification authentications , visitor control , multisecret sharing .