An active attack on protocols for server-aided RSA signature computation

被引:2
|
作者
Horng, G [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 40227, Taiwan
关键词
cryptography; server-aided computation; digital signature; RSA; active attacks;
D O I
10.1016/S0020-0190(97)00198-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main purpose of server-aided RSA signature computation protocols is to make use of an auxiliary processor to speed up the RSA signature computations to be performed by a device with limited processing power. However, all server-aided secret computation protocols are vulnerable to active attacks. A malicious server can manipulate the data provided to the client, and try to derive useful information about the secret exponent from the result released by the client. Most of the active attacks can be defeated if the client verifies the correctness of the final result before releasing it. In this paper, we propose a powerful active attack which can make the server-aided protocols insecure even if the client verifies the final signature. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:71 / 73
页数:3
相关论文
共 50 条
  • [21] SERVER-AIDED HONEST COMPUTATION FOR CRYPTOGRAPHIC APPLICATIONS
    YEN, SM
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (12) : 61 - 64
  • [22] Security analysis of a server-aided RSA key generation protocol
    Cao, Tianjie
    Mao, Xianping
    Lin, Dongdai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 314 - 320
  • [23] Server-aided verification proxy re-signature
    Wang, Zhiwei
    Lv, Wei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1704 - 1707
  • [24] Server-Aided Verification Signature with Privacy for Mobile Computing
    Xu, Lingling
    Li, Jin
    Tang, Shaohua
    Baek, Joonsang
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [25] Efficient Attribute Based Server-Aided Verification Signature
    Chen, Yu
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Zhang, Yichen
    Yi, Peng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3224 - 3232
  • [26] On the security of two server-aided verification signature schemes
    Wu, H. (daisylilac@126.com), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [27] Attribute-based Server-Aided Verification Signature
    Wang, Zhiwei
    Xie, Ruirui
    Wang, Shaohui
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3183 - 3190
  • [28] A new construction of the server-aided verification signature scheme
    Wang, Zhiwei
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 97 - 101
  • [29] Server-aided digital signature protocol based on password
    He, YZ
    Wu, CK
    Feng, DG
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 89 - 92
  • [30] Smart-phone Based Server-Aided Computation
    Cao, Tianjie
    He, Tao
    Luo, Qihan
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 295 - 298