An active attack on protocols for server-aided RSA signature computation

被引:2
|
作者
Horng, G [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 40227, Taiwan
关键词
cryptography; server-aided computation; digital signature; RSA; active attacks;
D O I
10.1016/S0020-0190(97)00198-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main purpose of server-aided RSA signature computation protocols is to make use of an auxiliary processor to speed up the RSA signature computations to be performed by a device with limited processing power. However, all server-aided secret computation protocols are vulnerable to active attacks. A malicious server can manipulate the data provided to the client, and try to derive useful information about the secret exponent from the result released by the client. Most of the active attacks can be defeated if the client verifies the correctness of the final result before releasing it. In this paper, we propose a powerful active attack which can make the server-aided protocols insecure even if the client verifies the final signature. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:71 / 73
页数:3
相关论文
共 50 条
  • [31] Server-Aided Secure Computation with Off-line Parties
    Baldimtsi, Foteini
    Papadopoulos, Dimitrios
    Papadopoulos, Stavros
    Scafuro, Alessandra
    Triandopoulos, Nikos
    COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 103 - 123
  • [32] Architecture of a server-aided signature service (SASS) for mobile networks
    Cai, L
    Yang, XH
    Chen, C
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 819 - 826
  • [33] Server-aided aggregate verification signature: Security definition and construction
    Wu, Huai
    Xu, Chunxiang
    Deng, Jiang
    International Journal of Information and Communication Technology, 2015, 7 (2-3) : 278 - 286
  • [34] Oblivious and Fair Server-Aided Two-Party Computation
    Herzberg, Amir
    Shulman, Haya
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 75 - 84
  • [35] Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation
    Xu, Rui
    Morozov, Kirill
    Basu, Anirban
    Rahman, Mohammad Shahriar
    Kiyomoto, Shinsaku
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 159 - 178
  • [36] The Beguin-Quisquater server-aided RSA protocol from Crypto '95 is not secure
    Nguyen, P
    Stern, J
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 372 - 379
  • [37] Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Paik, Juryon
    Won, Dongho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 47 - 57
  • [38] Server-aided batch verification signature schemes in the multiple-signer setting
    Wang, Bin
    Zhao, Qing
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) : 1359 - 1366
  • [39] Cryptanalysis of server-aided password-based authenticated key exchange protocols
    Won, D. (dhwon@security.re.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [40] Server-Aided and Verifiable Attribute-Based Signature for Industrial Internet of Things
    Zhang Y.
    He J.
    Guo R.
    Zheng D.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2177 - 2187