Colluding attacks to a payment protocol and two signature exchange schemes

被引:0
|
作者
Bao, F [1 ]
机构
[1] Inst Infocomm Res, Singapore 119613, Singapore
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt'03, which employs the existent techniques of the off-line untraceable cash and a new technique called restrictive confirmation signature scheme (RCSS). It is claimed that the fair payment protocol has both the fairness such that the buyer obtains the digital goods if and only if the merchant gains the digital cash and the untraceability and unlinkability such that no one can tell who is the original owner of the money. In this paper we show that the fairness is breached under a simple colluding attack, by which a dishonest merchant can obtain the digital money without the buyer obtaining the goods. We also apply the attack to some of the schemes of fair exchange of digital signatures proposed by Ateniese in ACM CCS'99. Our study shows that two of them are subjected to the attack. A countermeasure against the attack is proposed for the fair exchange of digital signatures. However, we are unable to fix the fair payment protocol if the untraceability and unlinkability are the required features.
引用
收藏
页码:417 / 429
页数:13
相关论文
共 50 条
  • [41] Securing symmetric watermarking schemes against protocol attacks
    Katzenbeisser, S
    Veith, H
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 260 - 268
  • [42] Multi-signature schemes secure against active insider attacks
    Ohta, K
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 21 - 31
  • [43] Analysis Of Shim’s Attacks Against Some Certificateless Signature Schemes
    Cao, Zhengjun
    Markowitch, Olivier
    International Journal of Network Security, 2021, 23 (03) : 545 - 548
  • [44] Attacks on authentication and signature schemes involving corruption of public key (modulus)
    Kara-Ivanov, Michael
    Iceland, Eran
    Kipnis, Aviad
    FDTC 2008: FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2008, : 108 - +
  • [45] Harnessing Biased Faults in Attacks on ECC-based Signature Schemes
    Jarvinen, Kimmo
    Blondeau, Celine
    Page, Dan
    Tunstall, Michael
    2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, : 72 - 82
  • [46] Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem
    An, Youngjoo
    Lee, Hyang-Sook
    Lee, Juhee
    Lim, Seongan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [47] Insider attacks on multi-proxy multi-signature schemes
    Guo, Lifeng
    Wang, Guilin
    COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 88 - 93
  • [48] Counterfeiting attacks on two robust watermarking schemes
    Lu, Zhe-Ming
    Liao, Xin-Wu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2006, 2 (04): : 841 - 848
  • [49] Two simple attacks on a blind signature scheme
    Tian, Miaomiao
    Zhu, Youwen
    Chen, Zhili
    International Journal of Network Security, 2014, 16 (06) : 498 - 500
  • [50] An improved quantum payment protocol based on group signature without entanglement
    Jiang, Wenhua
    Zhuang, Jincheng
    MODERN PHYSICS LETTERS A, 2024, 39 (04)