skip to main content
article

A server assisted authentication protocol for detecting error vectors

Authors Info & Claims
Published:01 April 2004Publication History
Skip Abstract Section

Abstract

This article presents a server assisted authentication protocol for RSA signature and two cryptanalysis of the protocol. An improved protocol is also proposed for extending the previous server assisted authentication protocol for RSA signature to detect the one-round active attack.

References

  1. R. J. Anderson "Attack on server assisted authentication protocols," IEEE Electronics Letters, vol. 28, p. 1473, July 1992.Google ScholarGoogle ScholarCross RefCross Ref
  2. Chin-Chen Chang and Min-Shiang Hwang, "Parallel computation of the generating keys for RSA cryptosystems," IEE Electronics Letters, vol. 32, no. 15, pp. 1365--1366, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  3. G. Horng, "An active attack on protocols for server-aided RSA signature computation," Information Processing Letters, vol. 65, pp. 71--73, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Min-Shiang Hwang, "Improved attack on server assisted authentication protocols," Journal of Chaoyang, vol. 4, pp. 93--100, Oct. 1999.Google ScholarGoogle Scholar
  5. Shin-Jia Hwang and Chin-Chen Chang, "A new efficient server-aided RSA secret computation protocol against active attacks," IEICE Trans. on Fundamentals, vol. E83-A, pp. 567--570, Mar. 2000.Google ScholarGoogle Scholar
  6. Shin-Jia Hwang, Chin-Chen Chang, and Wei-Pang Yang, "Some active attacks on fast server-aided RSA secret computation protocol for modular exponentiation," in Proceedings of Cryptography: Policy and Algorithem Conference, pp. 3--5, July 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Chi-Sung Laih and Fu-Kuan Tu, "Remarks on parameter selection for server-aided secret RSA computation schemes," in Proceedings of International Workshops on Parallel Processing, pp. 167--172, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chu-Hsing Lin and Chin-Chen Chang, "A server-aided computation protocol for RSA enciphering algorithm," in National Computer Symposium'93, R.O.C., pp. 547--552, Dec. 1993.Google ScholarGoogle Scholar
  9. Tsutomu Matsumoto, Koki Kato, and Hideki Imai, "Speeding up secret computations with insecure auxiliary devices," in Advances in Cryptology, CRYPTO'88, pp. 497--506, Lecture Notes in Computer Science, Vol. 403, Aug. 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, vol. 21, pp. 120--126, Feb. 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A server assisted authentication protocol for detecting error vectors
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGOPS Operating Systems Review
            ACM SIGOPS Operating Systems Review  Volume 38, Issue 2
            April 2004
            92 pages
            ISSN:0163-5980
            DOI:10.1145/991130
            Issue’s Table of Contents

            Copyright © 2004 Authors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 April 2004

            Check for updates

            Qualifiers

            • article
          • Article Metrics

            • Downloads (Last 12 months)2
            • Downloads (Last 6 weeks)1

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader