A New Efficient Server-Aided RSA Secret Computation Protocol against Active Attacks
نویسندگان
چکیده
In the RSA signature scheme [17], the secret computation M mod N is the most time consuming operation, where N is the product of two large prime numbers and d is the secret key. To perform this operation is hard for the device with limited computation power, so Matsumoto et al. [13] proposed the idea of server-aided secret computation protocols. In a server-aided secret computation protocol, the device with limited computation power is the client while the device with huge computation power is the server. With the help of a server, a client performs the secret computation easily without releasing the secret key of the client. Many protocols are proposed for the RSA secret computation. According to the relation between the transmitted data and the secret key, these protocols are classified into two classes: the dependent protocols [7], [10]–[14] and the independent protocols [9], [16]. For the independent protocols, there is no relation between transmitted data and secret key. On the other hand, for the dependent protocols, there is a relation between the transmitted data and the secret key. To break these protocols, there are two kinds of the proposed attacks: the active attacks [1]–[4], [6], [15], [18] and the passive attacks [2], [7], [15]. By the passive attacks, an intruder derives the secret data of the client only from the transmitted data of the client. By the active attacks, the server first sends the altered data with some special form to the client. Then the server may discover the secret data of the client from the final result of the secret computation. To remove the threat of active attacks, [2], [15] sug-
منابع مشابه
A new appraoch to server-aided secret computation
Server-Aided Secret Computation(SASC) protocol enables the client(smart card) to borrow the computing power from the server(un trusted auxiliary device like ATM) without revealing the secret information of the client. The previous approach is to decompose the client's secret information into many pieces and to reveal some of them to the server. It signiicantly accelerates the secret computation...
متن کاملSecurity and Performance of Server-Aided RSA Computation Protocols
This paper investigates various security issues and provides possible improvements on server-aided RSA computation schemes, mainly focused on the twephase protocols, RSA-SlM and RSA-S$M, proposed by Matsumoto et d. [4]. We first present new active attacks on these protocols when the find result is not checked. A server-aided protocol is then proposed in which the client can check the computed s...
متن کاملFast Server-Aided RSA Signatures Secure Against Active Attacks
Small units like chip cards have the possibility of computing, storing and protecting data. Today such chip cards have limited computing power, then some cryptoprotocols are too slow. Some new chip cards with secure fast coprocessors are coming but are not very reliable at the moment and a little bit expensive for some applications. In banking a p plications there are few servers (ATM) relative...
متن کاملThe Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure
A well-known cryptographic scenario is the following: a smart card wishes to compute an RSA signature with the help of an untrusted powerful server. Several protocols have been proposed to solve this problem , and many have been broken. There exist two kinds of attacks against such protocols: passive attacks (where the server follows the instructions) and active attacks (where the server may re...
متن کاملAttacks on Protocols for Server-Aided RSA Computation
On Crypto ’88, Matsumoto, Kato, and Imai presented protocols to speed up secret computations with insecure auxiliary devices. The two most important protocols enable a smart card to compute the secret RSA operation faster with the help of a server that is not necessarily trusted by the card holder. It was stated that if RSA is secure, the protocols could only be broken by exhaustive search in c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000