期刊文献+

Key substitution attacks on some verifiably encrypted signature schemes

Key substitution attacks on some verifiably encrypted signature schemes
下载PDF
导出
摘要 As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting.
出处 《High Technology Letters》 EI CAS 2011年第2期191-195,共5页 高技术通讯(英文版)
基金 Supported by the National High Technology Research and Development Programme of China ( No. 2008AA092301 ) and the National Natural Science Foundation of China (No. 50879014).
关键词 CRYPTOGRAPHY fair exchange verifiably encrypted signature key substitution attack 可验证加密 签名方案 替换攻击 用户设置 公平交换 数字签名 安全 复杂性
  • 相关文献

参考文献1

二级参考文献9

  • 1ASOKAN N, SHOUP V, WAIDNER M. Optimistic fair exchange of digital signatures[A]. Proceedings of Eurocrypt'98[C].Springer-Verlag, 1998. 被引量:1
  • 2ATENISE G. Efficient verifiable encryption (and fair exchange) of digital signatures[A]. Proceedings of Sixth ACM Conference on Computer and Communications Security[C]. Singapore, 1999. 138-146. 被引量:1
  • 3BONEH D, GENTRY C. Aggregate and verifiably encrypted signatures from bilinear maps[A]. Proceedings of Eurocrypt 2003[C].Springer-Verlag, 2003.614-629. 被引量:1
  • 4BONEH D, LYNN B, SHACHAM H. Short signatures from the weil pairing[A]. Proceedings of Asiacrypt 2001[C]. Springer-Verlag,2001. 514-532. 被引量:1
  • 5GARAY J, JAKOBSSON M, MACKENZIE P. Abuse-free optimistic contract signing[A]. Proceedings of Crypto '99[C]. Springer-Verlag,2000. 449-466. 被引量:1
  • 6CAMINISCH J, SHOUP V. Practice verifiable encryption and decryption of discrete logarithms[A]. Proceedings of Crypto2003[C].Springer-Verlag, 2003. 被引量:1
  • 7BANRETO P, KIM H, LYNN B, et al. Efficient algorithm for pairing-based cryptosystems[A]. Crypto 2002[C]. Berlin, 2002.354-368. 被引量:1
  • 8蒋晓宁,叶澄清,潘雪增.基于半可信离线第三方的公平交易协议[J].计算机研究与发展,2001,38(4):502-508. 被引量:14
  • 9邓所云,詹榜华,胡正名,杨义先.一个优化的公平的电子支付方案[J].计算机学报,2002,25(10):1094-1098. 被引量:10

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部