Colluding attacks to a payment protocol and two signature exchange schemes

被引:0
|
作者
Bao, F [1 ]
机构
[1] Inst Infocomm Res, Singapore 119613, Singapore
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt'03, which employs the existent techniques of the off-line untraceable cash and a new technique called restrictive confirmation signature scheme (RCSS). It is claimed that the fair payment protocol has both the fairness such that the buyer obtains the digital goods if and only if the merchant gains the digital cash and the untraceability and unlinkability such that no one can tell who is the original owner of the money. In this paper we show that the fairness is breached under a simple colluding attack, by which a dishonest merchant can obtain the digital money without the buyer obtaining the goods. We also apply the attack to some of the schemes of fair exchange of digital signatures proposed by Ateniese in ACM CCS'99. Our study shows that two of them are subjected to the attack. A countermeasure against the attack is proposed for the fair exchange of digital signatures. However, we are unable to fix the fair payment protocol if the untraceability and unlinkability are the required features.
引用
收藏
页码:417 / 429
页数:13
相关论文
共 50 条
  • [1] Colluding attacks on a group signature scheme
    郭兴阳
    唐朝京
    Journal of Zhejiang University Science A(Science in Engineering), 2005, (10) : 1011 - 1014
  • [2] Colluding attacks on a group signature scheme
    Guo X.-Y.
    Tang C.-J.
    Journal of Zhejiang University-SCIENCE A, 2005, 6 (10): : 1011 - 1014
  • [3] Notes on Two Flawed Attacks on Undeniable Signature Schemes
    Behnia, Rouzbeh
    Heng, Swee-Huay
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [4] Algebraic and quantum attacks on two digital signature schemes
    Roman'kov, Vitaly
    Ushakov, Alexander
    Shpilrain, Vladimir
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2023, 17 (01)
  • [5] Forgery attacks on two provably secure certificateless signature schemes
    Shim, Kyung-Ah
    INFORMATION SCIENCES, 2020, 521 : 81 - 87
  • [6] Attacks against Two Provably Secure Certificateless Signature Schemes
    Hu Guozheng
    Hong Fan
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 246 - +
  • [7] Fault attacks on signature schemes
    Giraud, C
    Knudsen, EW
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 478 - 491
  • [8] Asymmetric Subversion Attacks on Signature Schemes
    Liu, Chi
    Chen, Rongmao
    Wang, Yi
    Wang, Yongjun
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 376 - 395
  • [9] Lattice Attacks on Digital Signature Schemes
    N. A. Howgrave-Graham
    N. P. Smart
    Designs, Codes and Cryptography, 2001, 23 : 283 - 290
  • [10] Lattice attacks on digital signature schemes
    Howgrave-Graham, N.A.
    Smart, N.P.
    HP Laboratories Technical Report, 1999, (90):