Rogue public key registration attack and the importance of proof of possession in the PKI environment

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 715
  • Download : 1
DC FieldValueLanguage
dc.contributor.authorLee, Younhoko
dc.contributor.authorPark, Yongsuko
dc.contributor.authorKim, Heeyoulko
dc.contributor.authorHong, Seong-Minko
dc.contributor.authorYoon, Hyunsooko
dc.date.accessioned2008-03-10T06:52:02Z-
dc.date.available2008-03-10T06:52:02Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2006-08-
dc.identifier.citationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E89D, no.8, pp.2452 - 2455-
dc.identifier.issn0916-8532-
dc.identifier.urihttp://hdl.handle.net/10203/3357-
dc.description.abstractThe security vulnerabilities of a number of provable secure proxy signature schemes are examined,with the assumption that users can register their public keys without having corresponding private keys. This assumption is different from that of a standard proxy signature in which the public keys of users are authentic. Under this assumption, both the Triple Schnorr scheme and Kang et al's scheme are shown to be vulnerable to a rogue public key registration attack. This attack gives an adversary the ability to generate a proxy signature without the valid agreement of the original signer. Moreover, it is shown that an adversary can manipulate the description of a delegated signing right at will. This work can be considered as an awakening to the importance of Proof of Possession (PoP) in the PKI environment, as in many cases certificate authorities do not require the PoP protocol, as has been stated [1].-
dc.description.sponsorshipThis work was supported by the Ministry of Science and Technology (MOST)/Korea Science and Engineering Foundation (KOSEF) through the Advanced Information Technology Research Center (AITrc) and the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).en
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectPROTECTED SIGNATURE SCHEMES-
dc.subjectPROXY SIGNATURES-
dc.titleRogue public key registration attack and the importance of proof of possession in the PKI environment-
dc.typeArticle-
dc.identifier.wosid000239578100017-
dc.identifier.scopusid2-s2.0-33747848597-
dc.type.rimsART-
dc.citation.volumeE89D-
dc.citation.issue8-
dc.citation.beginningpage2452-
dc.citation.endingpage2455-
dc.citation.publicationnameIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.identifier.doi10.1093/ietisy/e89-d.8.2452-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorYoon, Hyunsoo-
dc.contributor.nonIdAuthorLee, Younho-
dc.contributor.nonIdAuthorPark, Yongsu-
dc.contributor.nonIdAuthorKim, Heeyoul-
dc.contributor.nonIdAuthorHong, Seong-Min-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorproxy signature-
dc.subject.keywordAuthordigital signature-
dc.subject.keywordAuthorcryptanalysis-
dc.subject.keywordPlusPROTECTED SIGNATURE SCHEMES-
dc.subject.keywordPlusPROXY SIGNATURES-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0