Unifying Kleptographic Attacks

被引:2
|
作者
Teseleanu, George [1 ,2 ]
机构
[1] Adv Technol Inst, 10 Dinu Vintila, Bucharest, Romania
[2] Alexandru Ioan Cuza Univ, Dept Comp Sci, Iasi 700506, Romania
来源
SECURE IT SYSTEMS | 2018年 / 11252卷
关键词
DISCRETE LOGARITHMS; IDENTIFICATION;
D O I
10.1007/978-3-030-03638-6_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present two simple backdoors that can be implemented into Maurer's unified zero-knowledge protocol [22]. Thus, we show that a high level abstraction can replace individual backdoors embedded into protocols for proving knowledge of a discrete logarithm (e.g. the Schnorr and Girault protocols), protocols for proving knowledge of an eth-root (e.g. the Fiat-Shamir and Guillou-Quisquater protocols), protocols for proving knowledge of a discrete logarithm representation (e.g. the Okamoto protocol) and protocols for proving knowledge of an eth-root representation.
引用
收藏
页码:73 / 87
页数:15
相关论文
共 50 条
  • [1] Cliptography: Clipping the Power of Kleptographic Attacks
    Russell, Alexander
    Tang, Qiang
    Yung, Moti
    Zhou, Hong-Sheng
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 34 - 64
  • [2] Kleptographic Attacks on Elliptic Curve Cryptosystems
    Mohamed, Elsayed
    Elkamchouchi, Hassan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 213 - 215
  • [3] Kleptographic Attacks on Elliptic Curve Signatures
    Mohamed, Elsayed
    Elkamchouchi, Hassan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 264 - 267
  • [4] Kleptographic attacks on e-voting schemes
    Gogolewski, Marcin
    Klonowski, Marek
    Kubiak, Przemyslaw
    Kutylowski, Miroslaw
    Lauks, Anna
    Zagorski, Filip
    [J]. EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 494 - 508
  • [5] Blockchain-based immunization against kleptographic attacks
    Changsong JIANG
    Chunxiang XU
    Jie CHEN
    Kefei CHEN
    [J]. Science China(Information Sciences), 2024, (07) - 183
  • [6] Blockchain-based immunization against kleptographic attacks
    Jiang, Changsong
    Xu, Chunxiang
    Chen, Jie
    Chen, Kefei
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (07)
  • [7] Stealing secrets with SSL/TLS and SSH -: Kleptographic attacks
    Golobiewski, Zbigniew
    Kutylowski, Miroslaw
    Zagorski, Filip
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 191 - +
  • [8] Blockchain-based immunization against kleptographic attacks
    Changsong JIANG
    Chunxiang XU
    Jie CHEN
    Kefei CHEN
    [J]. Science China(Information Sciences)., 2024, 67 (07) - 183
  • [9] The prevalence of kleptographic attacks on discrete-log based cryptosystems
    Young, A
    Yung, M
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 264 - 276
  • [10] Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
    Ravi, Prasanna
    Bhasin, Shivam
    Chattopadhyay, Anupam
    Aikata, Aikata
    Roy, Sujoy Sinha
    [J]. PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 216 - 221