Abstract
This article presents a server assisted authentication protocol for RSA signature and two cryptanalysis of the protocol. An improved protocol is also proposed for extending the previous server assisted authentication protocol for RSA signature to detect the one-round active attack.
- R. J. Anderson "Attack on server assisted authentication protocols," IEEE Electronics Letters, vol. 28, p. 1473, July 1992.Google ScholarCross Ref
- Chin-Chen Chang and Min-Shiang Hwang, "Parallel computation of the generating keys for RSA cryptosystems," IEE Electronics Letters, vol. 32, no. 15, pp. 1365--1366, 1996.Google ScholarCross Ref
- G. Horng, "An active attack on protocols for server-aided RSA signature computation," Information Processing Letters, vol. 65, pp. 71--73, 1998. Google ScholarDigital Library
- Min-Shiang Hwang, "Improved attack on server assisted authentication protocols," Journal of Chaoyang, vol. 4, pp. 93--100, Oct. 1999.Google Scholar
- Shin-Jia Hwang and Chin-Chen Chang, "A new efficient server-aided RSA secret computation protocol against active attacks," IEICE Trans. on Fundamentals, vol. E83-A, pp. 567--570, Mar. 2000.Google Scholar
- Shin-Jia Hwang, Chin-Chen Chang, and Wei-Pang Yang, "Some active attacks on fast server-aided RSA secret computation protocol for modular exponentiation," in Proceedings of Cryptography: Policy and Algorithem Conference, pp. 3--5, July 1995. Google ScholarDigital Library
- Chi-Sung Laih and Fu-Kuan Tu, "Remarks on parameter selection for server-aided secret RSA computation schemes," in Proceedings of International Workshops on Parallel Processing, pp. 167--172, 1999. Google ScholarDigital Library
- Chu-Hsing Lin and Chin-Chen Chang, "A server-aided computation protocol for RSA enciphering algorithm," in National Computer Symposium'93, R.O.C., pp. 547--552, Dec. 1993.Google Scholar
- Tsutomu Matsumoto, Koki Kato, and Hideki Imai, "Speeding up secret computations with insecure auxiliary devices," in Advances in Cryptology, CRYPTO'88, pp. 497--506, Lecture Notes in Computer Science, Vol. 403, Aug. 1988. Google ScholarDigital Library
- R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, vol. 21, pp. 120--126, Feb. 1978. Google ScholarDigital Library
Index Terms
- A server assisted authentication protocol for detecting error vectors
Recommendations
Strong Authentication Scheme for Remote Autonomous Object
NISS '09: Proceedings of the 2009 International Conference on New Trends in Information and Service ScienceGenerally, a remote autonomous object acts with its own thread of control. In 2003, Novikov and Kiselev proposed an authentication scheme of the user from the remote autonomous object with public key cryptosystem which is applicable in the ...
On the Security of Some Password Authentication Protocols
In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authentication protocol. User authentication via user memorable password ...
Breaking an ID-based encryption based on discrete logarithm and factorization problems
We cryptanalyse the new ID-based encryption scheme proposed by Meshram.We find a method to factorize N, where N is the parameter proposed by Meshram.We also give a method to recover the secret master key of Meshram's ID-based encryption scheme.We also ...
Comments