Skip to main content

RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols

  • Conference paper
Networking and Mobile Computing (ICCNMC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3619))

Included in the following conference series:

  • 692 Accesses

Abstract

By applying the concept of VRES (Verifiable and Recoverable Encrypted Signature), a kind of RSA-based fair exchange protocols try to provide security mechanism on information delivery assurance. However, due to incomplete verification on VRES, RSA extended modulus attacks addressed in this paper can be launched on those protocols successfully, causing failure on fairness of exchange. The RSA-DEMCA algorithm is proposed, achieving complete verifications on VRES without sensible information leakage. Security analysis on RSA-DEMCA is also addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G.: Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. In: Proc. ACM Conference on Computer and Communications Security, Singapore, November 1999, pp. 138–146 (1999)

    Google Scholar 

  2. Chen, L.: Efficient Fair Exchange with Verifiable Confirmation of Signatures. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 286–299. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Nenadic, A., Zhang, N., Barton, S.: A Security Protocol for Certified E-Goods Delivery. In: Proceedings of IEEE International Conference on Information Technology, Coding and Computing (ITCC 2004) - Information Assurance and Security Track, pp. 22–28. IEEE Computer Society, Las Vegas (2004)

    Chapter  Google Scholar 

  4. Zhou, Y.B., Zhang, Z.F., Qing, S.H., Ji, Q.G.: A Fair Exchange Protocol Based on RSA Signature Scheme. Journal of Software 15(07), 1049–1055 (2004)

    MATH  Google Scholar 

  5. Franklin, M., Reiter, M.: Fair Exchange with a Semi-Trusted Third Party. In: Proc. ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1997, pp. 1–5 (1997)

    Google Scholar 

  6. Bao, F., Deng, R.: An Efficient Fair Exchange Protocol with an Off-Line Semi-Trusted Third Party. In: Proc. International Workshop on Cryptographic Techniques and E-Commerce, pp. 37–47 (1999)

    Google Scholar 

  7. Schneier, B.: Applied Cryptography. John Wiley & Sons, Chichester (1996)

    Google Scholar 

  8. Mao, W.: Modern Cryptography: Theory and Practice. Publishing House of Electronics Industry (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, P., Jiang, L., Wu, J., Zhang, J. (2005). RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_114

Download citation

  • DOI: https://doi.org/10.1007/11534310_114

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28102-3

  • Online ISBN: 978-3-540-31868-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics