期刊文献+

对一种(t,N-2)弹性Mix Net的密码学分析

Cryptanalysis of a (t,N-2)-resilient Mix Net
下载PDF
导出
摘要 分析了Gao等人提出的(t,N-2)弹性Mix Net方案,发现存在严重安全漏洞.主动攻击者利用Elgamal算法的可展性构造具有相关性的密文组,然后通过观察对应明文组的相关性获得输入与输出的对应关系,最终破坏Mix Net的秘密性.两个不同服务器组中的恶意服务器可以相互勾结利用共谋攻击使Mix Net输出错误结果,并以不可忽略的概率逃过验证协议的检验.分析结果说明Gao的方案不满足(t,N-2)弹性,且基于该Mix Net的电子投票应用也是不安全的. We analysed Gao et al. ' s (t, N - 2)-resilient Mix Net scheme and found some serious security flaws in their design. In order to break Mix Net's privacy, an active attacker can construct a list of ciphertexts with some relativity by utilizing the malleability of the E1Gamal encryption scheme, and then observe the corresponding relativity of plaintexts to get the relationship between input and output elements. The malicious servers from two different groups can initiate collusion attacks proposed by this paper to make the Mix Net system output wrong and cheat the verifying protocol with non-negligible probability of success. The result of analysis shows that Gao et al. 's scheme does not satisfy (t, N-2)- resilience and that the electronic voting application based on their Mix Net is also insecure.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2007年第6期926-929,934,共5页 Journal of Xidian University
基金 国家自然科学基金面上项目资助(60473028)
关键词 匿名通信 MIX NET 共谋攻击 anonymous communication Mix Net collusion attacks
  • 相关文献

参考文献4

二级参考文献26

  • 1Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 1981, 24(2) ,84~88.
  • 2Reiter M K, Rubin A D. Crowdst Anonymity for Web Transaction. ACM Transactions on Information and System Security, 1998,1(1):66~92.
  • 3Syverson P F, Goldschlag D M, Reed M G. Anonymous connections and onion routing. IEEE Journal of Selected Areas in Commun. , 1998,16(4) : 482~494.
  • 4Pfitzmann A, Pfitzmann B. How to break the direct RSA-implementation of mixes. In:Advances in Cryptology—EUROCRYPT'89. Berlin: Springer-Verlag, 1989. 373~381.
  • 5Pfitzmann A, Pfitzmann B, Waidner M. ISDN-mixes: Untraceable communication with very small bandwidth overhead.In: Proceedings of the GI/ITG Conference on Communication in Distributed Systems,Mannheim, Germany, 1991. 451~463.
  • 6Ogata W, Kurosawa K, Sako K, Takatani K. Fault tolerant anonymous channel. In: Proceedings of ICICS'97, LNCS 1334,Berlin: Springer-Verlag, 1997, 440~ 444.
  • 7Abe M. Universally verifiable mix-net with verifieation work independent of the number of mix-eenters. In: Proceedings of EUROCRYPT' 98, LNCS 1403, Berlin: Springer-Verlag,1998, 437~447.
  • 8Abe M. A mix-network on permutation networks. In: Proceedings of ASIACRYPT' 99, LNCS 1716, Berlin: Springer-Verlag, 1999, 258~273.
  • 9Jakobsson M. A practical mix. In.. Proceedings of EUROCRYPT'98, LNCS 1403, Berlin: Springer-Verlag, 1998, 448~461.
  • 10Jakobsson M. Flash mixing. In: Proceedings of PODC' 99,ACM, 1999. 83~89.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部