Message Substitute Attack on Concurrent Signatures Protocol and its Improvement

被引:3
|
作者
Zhang, Yaling [1 ]
Wang, Xiaofeng [1 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710048, Peoples R China
关键词
D O I
10.1109/ISECS.2008.214
中图分类号
F [经济];
学科分类号
02 ;
摘要
At Eurocrypt 2004, the concept of concurrent signatures was introduced by Chen, Kudla and Paterson. Concurrent signatures contribute a novel approach for the traditional Problem of fair exchange of signatures. In this paper a general attack named the message substitute attack to the existing concurrent signatures protocol is proposed Under the message substitute attack there is no concurrent in the existing concurrent signatures protocols including perfect concurrent signatures (PCS) protocol proposed by Susilo et al and its improvement iPCS1 protocol proposed by Guilin Wang et al. To prevent the message substitute attack, an i2PCS1 protocol which is an improvement on iPCS1 protocol is proposed Further more an i3PCS1 protocol which is another improvement on iPCS1 protocol is proposed, the distinct advantage of i3PCS1 protocol is that its keystones are not published by the initial signer Alice finally but by the matching signer Bob, so that the matching signer Bob has some advantage over the initial signer Alice, while in almost all previous concurrent signatures protocols the initial signer Alice has some advantage. So the i3PCS1 Protocol differs from the previous concurrent signatures protocols.
引用
收藏
页码:497 / 501
页数:5
相关论文
共 50 条
  • [1] A NEW FORGERY ATTACK ON MESSAGE RECOVERY SIGNATURES
    Li Zichen Li Zhongxian Yang Yixian
    [J]. Journal of Electronics(China), 2000, (03) : 234 - 237
  • [2] A distributed message in message aware concurrent transmission protocol in IEEE 802.11 WLANs
    Young-myoung Kang
    Joon Yoo
    Joonsoo Lee
    Chong-kwon Kim
    [J]. EURASIP Journal on Wireless Communications and Networking, 2012
  • [3] A distributed message in message aware concurrent transmission protocol in IEEE 802.11 WLANs
    Kang, Young-myoung
    Yoo, Joon
    Lee, Joonsoo
    Kim, Chong-kwon
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012, : 1 - 13
  • [4] An extendable-message-passing protocol with signatures based on two hard problems and its applications
    Chang, CC
    Chang, YF
    Wu, WC
    [J]. 2005 International Conference on Cyberworlds, Proceedings, 2005, : 93 - 100
  • [5] A Protocol for Fair Electronic Purchase Based on Concurrent Signatures
    LI Xiangdong1
    2. Sias International College
    [J]. Wuhan University Journal of Natural Sciences, 2008, (05) : 609 - 614
  • [6] Covert Message Channels and Attack Vectors for IEEE Precision Time Protocol
    Jacobs, Luke
    DeCusatis, Casimer
    Wojciak, Paul
    Kaiser, Clay
    Guendert, Steve
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON PRECISION CLOCK SYNCHRONIZATION FOR MEASUREMENT, CONTROL, AND COMMUNICATION (ISPCS), 2022,
  • [7] Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks
    Lee, Yung-Cheng
    [J]. OPTICAL, ELECTRONIC MATERIALS AND APPLICATIONS, PTS 1-2, 2011, 216 : 506 - 509
  • [8] ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
    Tu, Tengfei
    Yin, Wei
    Zhang, Hua
    Zeng, Xingyu
    Deng, Xiaoxiang
    Zhou, Yuchen
    Liu, Xu
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 2315 - 2331
  • [9] The Trojan Message Attack on the Pay-to-Public-Key-Hash Protocol of Bitcoin
    Wang, Maoning
    Duan, Meijiao
    Zhu, Jianming
    [J]. BLOCKCHAIN TECHNOLOGY AND APPLICATION: SECOND CCF CHINA BLOCKCHAIN CONFERENCE (CBCC 2019), 2020, 1176 : 196 - 209
  • [10] Message block design of attack-resistant security protocol based on environment binding
    Tao, Hongcai
    He, Dake
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 241 - +