Security Analysis of Zhu-Bao's Verifiably Committed Signature(Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
A fair exchange scheme is a protocol by which two parties Alice and Bob swap items or services without allowing either party to gain an advantage by quitting prematurely or otherwise misbehaving. Verifiably committed signature is a generalized and unified model for non-interactive optimistic fair exchange scheme. The state-of-the-art verifiably committed signature that enjoys the off-line, setup-free and stand-alone properties is due to Zhu and Bao. In this article, we show that the Zhu-Bao's verifiably committed signature is insecure in the multi-user setting and then consider possible countermeasures.
- 社団法人電子情報通信学会の論文
- 2007-12-01
著者
-
YUM Dae
Department of Electronic and Electrical Engineering, POSTECH
-
LEE Pil
Department of Electronic and Electrical Engineering, POSTECH
-
Lee Pil
Department Of Electronic And Electrical Engineering Pohang University Of Science And Technology
-
Lee Pil
Department Of Electronic And Electrical Engineering
-
Yum Dae
Department Of Electronic And Electrical Engineering
-
Yum Dae
Department Of Electronic And Electrical Engineering Pohang University Of Science And Technology
-
Lee Pil
Pohang Univ. Of Sci. And Technol. Kyungbuk Kor
-
Yum Dae
Pohang Univ. Of Sci. And Technol. Kyungbuk Kor
-
LEE Pil
Department of Creative IT Excellence Engineering and the Department of Electrical Engineering, POSTECH
-
YUM Dae
Department of Electrical Engineering, POSTECH
関連論文
- Generalized Hash Chain Traversal with Selective Output
- Fast Verification of Hash Chains with Reduced Storage
- Sanitizable Signatures Reconsidered
- A Practical Electronic Cash System for Smart Cards
- Security Analysis of Yeh-Tsai Security Mechanism
- IS-60 Fetal hydronephrosis : prenatal diagnosis and postnatal management and outcome
- Efficient Fair Exchange from Identity-Based Signature
- Invisibly Sanitizable Signature without Pairings
- Generalized Hash Chain Traversal with Selective Output
- Generalized Combinatoric Accumulator
- An Efficient Implementation of Two-Term Exponentiation
- Security Analysis of Zhu-Bao's Verifiably Committed Signature(Information Security)
- P-IS-80 The value of matrix metalloproteinase-8 (MMP-8) level of amniotic fluid as a diagnostic tool of maternal chorioamnionitis(Perinatology 3,Group 108,International Session)
- Fast Verification of Hash Chains with Reduced Storage
- Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme(Fundamental Theories for Communications)
- Effect of dehydroepiandrosterone on the lipopolysaccharide-induced interleukin-6 production in canine macrophage cell line (DH-82)(Perinatology 1)
- Energy-Efficient Hash Chain Traversal
- Sanitizable Signatures Reconsidered
- Lightweight One-Time Signature for Short Messages
- Security Condition for Exact Localization in Wireless Ad Hoc Networks
- Unilateral Distance Bounding Protocol with Bidirectional Challenges
- Secure and Lightweight Localization Method for Wireless Sensor Networks