An active attack on protocols for server-aided RSA signature computation

被引:2
|
作者
Horng, G [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 40227, Taiwan
关键词
cryptography; server-aided computation; digital signature; RSA; active attacks;
D O I
10.1016/S0020-0190(97)00198-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main purpose of server-aided RSA signature computation protocols is to make use of an auxiliary processor to speed up the RSA signature computations to be performed by a device with limited processing power. However, all server-aided secret computation protocols are vulnerable to active attacks. A malicious server can manipulate the data provided to the client, and try to derive useful information about the secret exponent from the result released by the client. Most of the active attacks can be defeated if the client verifies the correctness of the final result before releasing it. In this paper, we propose a powerful active attack which can make the server-aided protocols insecure even if the client verifies the final signature. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:71 / 73
页数:3
相关论文
共 50 条
  • [41] Generic server-aided secure multi-party computation in cloud computing
    Wu, Yulin
    Wang, Xuan
    Susilo, Willy
    Yang, Guomin
    Jiang, Zoe L.
    Yiu, Siu-Ming
    Wang, Hao
    COMPUTER STANDARDS & INTERFACES, 2022, 79
  • [42] Server-aided verification: Theory and practice
    Girault, M
    Lefranc, D
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 605 - 623
  • [43] Comment on Wu et al.'s Server-aided Verification Signature Schemes
    Wang, Zhiwei
    Wang, Licheng
    Yang, Yixian
    Hu, Zhengming
    International Journal of Network Security, 2010, 10 (03) : 238 - 240
  • [44] Server-aided access control for cloud computing
    WENG Jian
    WENG Jia-si
    LIU Jia-nan
    HOU Lin
    网络与信息安全学报, 2016, 2 (10) : 58 - 76
  • [45] Server-aided multiparty private set intersection protocols for lightweight clients and the application in intelligent logistics
    Niu, Ziyu
    Li, Zhi
    Wang, Hao
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10940 - 10967
  • [46] Server-Aided Continuous Group Key Agreement
    Alwen, Joel
    Hartmann, Dominik
    Kiltz, Eike
    Mularczyk, Marta
    PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 69 - 82
  • [47] Provably secure server-aided verification signatures
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Huang, Xinyi
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) : 1705 - 1723
  • [48] Server-aided Revocable IBE with Identity Reuse
    Ma, Xuecheng
    Lin, Dongdai
    COMPUTER JOURNAL, 2020, 63 (04): : 620 - 632
  • [49] Identity-Based Server-Aided Decryption
    Liu, Joseph K.
    Chu, Cheng Kang
    Zhou, Jianying
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 337 - 352
  • [50] An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow
    Zhang, Jianhong
    Sun, Zhibin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (03) : 459 - 473