Message Substitute Attack on Concurrent Signatures Protocol and its Improvement

被引:3
|
作者
Zhang, Yaling [1 ]
Wang, Xiaofeng [1 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710048, Peoples R China
关键词
D O I
10.1109/ISECS.2008.214
中图分类号
F [经济];
学科分类号
02 ;
摘要
At Eurocrypt 2004, the concept of concurrent signatures was introduced by Chen, Kudla and Paterson. Concurrent signatures contribute a novel approach for the traditional Problem of fair exchange of signatures. In this paper a general attack named the message substitute attack to the existing concurrent signatures protocol is proposed Under the message substitute attack there is no concurrent in the existing concurrent signatures protocols including perfect concurrent signatures (PCS) protocol proposed by Susilo et al and its improvement iPCS1 protocol proposed by Guilin Wang et al. To prevent the message substitute attack, an i2PCS1 protocol which is an improvement on iPCS1 protocol is proposed Further more an i3PCS1 protocol which is another improvement on iPCS1 protocol is proposed, the distinct advantage of i3PCS1 protocol is that its keystones are not published by the initial signer Alice finally but by the matching signer Bob, so that the matching signer Bob has some advantage over the initial signer Alice, while in almost all previous concurrent signatures protocols the initial signer Alice has some advantage. So the i3PCS1 Protocol differs from the previous concurrent signatures protocols.
引用
收藏
页码:497 / 501
页数:5
相关论文
共 50 条
  • [21] Improvement of AODV Routing Protocol through Dynamic Route Change using Hello Message
    Choi, Youngjun
    Kang, Daeho
    Bahk, Saewoong
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 117 - 121
  • [22] An Improvement Key Distribution Protocol and Its BAN Analysis
    Shi Shi-ying
    Mao Yu-ming
    [J]. INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 381 - 384
  • [23] GNSS Data Message Performance: A New Methodology for its Understanding and Ideas for its Improvement
    Anghileri, M.
    Paonni, M.
    Fontanella, D.
    Eissfeller, B.
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL TECHNICAL MEETING OF THE INSTITUTE OF NAVIGATION, 2013, : 638 - 650
  • [24] Message and its origin authentication protocol for data aggregation in sensor networks
    Lee, HongKi
    Nyang, DaeHun
    Song, JooSeok
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 281 - 290
  • [25] Improvement of Key Exchange Protocol to prevent Man-in-the-middle Attack in the Satellite Environment
    Song, In-A
    Lee, Young-Seok
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 408 - 413
  • [26] Attack and improvement on the one-time password authentication protocol against theft attacks
    Kuo, Wen-Chung
    Lee, Yung-Cheng
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 1918 - +
  • [27] Evaluation of rushing attack on secured message transmission (SMT/SRP) protocol for mobile ad-hoc networks
    Rawat, A
    Vyavahare, PD
    Ramani, AK
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 62 - 66
  • [28] The accuracy of IEEE 1588 time synchronization protocol and its improvement
    Pang Fubin
    Yuan Yubo
    Gao Lei
    Song Liangliang
    [J]. PROCEEDINGS OF 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS (ICEMI), VOL. 1, 2015, : 289 - 293
  • [29] Cryptanalysis of NAKE Protocol based on ECC for SIP and Its Improvement
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING SYMPOSIA, VOLS 1-5, PROCEEDINGS, 2008, : 121 - +
  • [30] Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET
    Arthur, Menaka Pushpa
    Kannan, Kathiravan
    [J]. ETRI JOURNAL, 2015, 37 (06) : 1108 - 1119