文章摘要
Xia Qi(夏琦),Xu Chunxiang,Yu Yong.[J].高技术通讯(英文),2011,17(2):191~195
Key substitution attacks on some verifiably encrypted signature schemes
  
DOI:
中文关键词: 
英文关键词: cryptography, fair exchange, verifiably encrypted signature, key substitution attack
基金项目:
Author NameAffiliation
Xia Qi(夏琦)  
Xu Chunxiang  
Yu Yong  
Hits: 760
Download times: 0
中文摘要:
      
英文摘要:
      As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al.’s scheme, Gorantla, et al.’s scheme and Ming, et al.’s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting.
View Full Text   View/Add Comment  Download reader
Close

分享按钮