期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Key substitution attacks on some verifiably encrypted signature schemes
1
作者 夏琦 Xu Chunxiang Yu Yong 《High Technology Letters》 EI CAS 2011年第2期191-195,共5页
As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and mos... As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting. 展开更多
关键词 CRYPTOGRAPHY fair exchange verifiably encrypted signature key substitution attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部