1342 - 2812 Key - Substitution Attacks on

نویسندگان

  • Koichi Sakumoto
  • Keisuke Tanaka
چکیده

Group signatures were introduced by Chaum and Van Heyst [12], and many security requirements for group signatures have been proposed. Bellare, Micciancio, and Warinschi [4] showed that satisfying full-anonymity and full-traceability is sufficient, in the sence that all the above-mentioned requirements are implied by them. Wilson and Menezes [5] introduced a considerable attack against standard signatures, key substitution attack. In this paper, we propose security conditions of group signatures against this attack and show that the security requirements are not sufficient regarding the attack. We also propose a group signature scheme that is secure against the key substitution attack, fully-anonymous, and fully-traceable.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

1342 - 2812 A new lattice construction for partial key exposure attack for RSA ( revised ) Yoshinori Aono

In this paper we present a new lattice construction for a lattice based partial key exposure attack for the RSA cryptography. We consider the situation that the RSA secret key d is small and a sufficient amount of the LSBs (least significant bits) of d are known by the attacker. We show that our lattice construction is theoretically more efficient than known attacks proposed in [2, 7]. This is ...

متن کامل

ISSN 1342-2812 Sanitizable Signature with Secret Information

A sanitizable signature scheme is a signature scheme that allows the sanitizer to sanitize certain portions of the document and to generate the valid signature of the resulting document with no interaction with the signer. There exist many models and schemes for sanitizable signature. In this paper, we precisely formalize the algorithms and the security requirements of sanitizable signature wit...

متن کامل

Comment on the Public Key Substitution Attacks

In this paper we present a comment on some previous works about the Public Key Substitution Attacks (PKSA in brief). Though there exist some security flaws for the schemes being attacked, we point out that these attacks on them are either trivial or avoidable after a little modification.

متن کامل

Key - Substitutable Signature and its Application to Certified Signature

The key substitution property is introduced by Blake-Wilson and Menezes [1] and formalized by Menezes and Smart [8] as attacks. The key substitution property is as follow: another person other than true signer can produce another public (and secret) key such that a message and signature pair created by the signer is valid under the public key. The research of the key substitution attacks [8, 6,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007