DC Field | Value | Language |
---|---|---|
dc.contributor.author | Heeyoul Kim | ko |
dc.contributor.author | Younho Lee | ko |
dc.contributor.author | Seong-Min Hong | ko |
dc.contributor.author | Yoon, Hyunsoo | ko |
dc.date.accessioned | 2013-03-06T08:35:58Z | - |
dc.date.available | 2013-03-06T08:35:58Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2006 | - |
dc.identifier.citation | INTERNATIONAL JOURNAL OF NETWORK SECURITY, v.2, no.2, pp.105 - 110 | - |
dc.identifier.issn | 1816-3548 | - |
dc.identifier.uri | http://hdl.handle.net/10203/86463 | - |
dc.description.abstract | SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) without revealing its secret information. In this paper, we propose a new active attack on server-aided secret computation protocols. We describe our attack by using Beguin and Quisquater’s protocol. (We modify the protocol in order to immunize it against Nguyen and Stern’s lattice reduction attack.) The proposed attack reduces the search space P to 1 p + pP, where 0 < p < 1. It is 2p P for optimal p. Practically, it effectively threatens SASC protocols because an attacker can choose an appropriate value p according to the situation. Therefore, the security parameters in the existing SASC protocols must be reconsidered. | - |
dc.language | English | - |
dc.publisher | Femto Technique Co., LTD. | - |
dc.title | Active Trial-and-error Attack on SASC Protocols | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.citation.volume | 2 | - |
dc.citation.issue | 2 | - |
dc.citation.beginningpage | 105 | - |
dc.citation.endingpage | 110 | - |
dc.citation.publicationname | INTERNATIONAL JOURNAL OF NETWORK SECURITY | - |
dc.contributor.localauthor | Yoon, Hyunsoo | - |
dc.contributor.nonIdAuthor | Heeyoul Kim | - |
dc.contributor.nonIdAuthor | Younho Lee | - |
dc.contributor.nonIdAuthor | Seong-Min Hong | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.