5.2 Veriiable Signature Sharing
نویسنده
چکیده
A linear protocol failure for RSA with exponent three. A method for obtaining digital signatures and public-key cryptosystems. distribution protocol for digital mobile communication systems. are linear combinations of the unknowns b j with known coeecients, S i0 can compute a linear relation that holds among the shares: k X j=0 p j Bi j = 0 m o d N: 2 Since server S i0 knows p 0 Bi 0 , which is nonzero with high probability, it can learn an inhomogeneous linear relation among the other k terms fp j Bi j g 1jk : k X j=1 p j Bi j = ,p 0 Bi 0 m o d N: Using this information, and the easily computable ciphertext p e j Bi j e mod N of each term, it can use the techniques described before to recover each term p j Bi j and hence Bi j. Using Lagrange interpolation, it can then recover the secret polynomial B and the signature b 0. It is interesting to note that this attack fails for a passive e a vesdropper that is not one of the n servers. Such a n e a vesdropper sees only the published RSA encryptions of each share, i.e., fBi e mod Ng 1in. The eavesdropper can again nd a linear equation of the form 2 among any k + 1 of the shares. However, since this equation is homogeneous, it can recover only homogeneous polynomials of degree e in the terms p j Bi j see Section 4.2. 6 Conclusion We h a ve identiied a new class attacks against RSA with low encrypting exponent , which exploit known polynomial relationships among the encrypted messages. This can lead to weaknesses in protocols for which such relationships can be inferred. When the relationships are essential to the correctness of a protocol, as in the case of Section 5.2, the only repair seems to be increasing the size of the encrypting exponent. If the polynomial relationships are not essential, then another repair might be to transform the plaintexts so that those relationships no longer hold. Possible transformations are applying a public permutation, such as DES with a xed key, or padding the plaintext with random bits though this may not always suuce; see 2. Such transformations are discussed, e.g., in 1. Due to the widespread popularity of RSA with low encrypting exponent, our attacks …
منابع مشابه
Publicly Veriiable Secret Sharing
A secret sharing scheme allows to share a secret among several participants such that only certain groups of them can recover it. Veriiable secret sharing has been proposed to achieve security against cheating participants. Its rst realization had the special property that everybody, not only the participants, can verify that the shares are correctly distributed. We will call such schemes publi...
متن کاملEecient Convertible Undeniable Signature Schemes
Undeniable signatures are digital signatures which are not universally veriiable but can only be checked with the signer's help. However, the signer cannot deny the validity of a correct signature. An extended concept , convertible undeniable signatures, allows the signer to convert single undeniable signatures or even the whole scheme into universally veriiable signatures or into an ordinary d...
متن کاملVeriiable Escrowed Signature
We combine a publicly veriiable encryption technique and a Schnorr type signature scheme to achieve a veriiable escrowed signature scheme. The scheme allows a signer to convince a veriier the validity of a signature without letting him see the signature value. The unavailable but veriiable signature is encrypted under a public key of someone (e.g., a trusted third party) who stays oo-line. The ...
متن کاملVeri able Secret Sharing as Secure
Veriiable Secret Sharing is a fundamental primitive for secure cryptographic design. We present a stronger notion of veriiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veriiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself. Indeed our deenition, and so our protocol sa...
متن کاملVerifiable Secret Sharing as Secure Computation
We present a stronger notion of veriiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veriiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1979