O ct 2 00 7 Key Substitution in the Symbolic Analysis
نویسنده
چکیده
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the new signature key. Schemes vulnerable to this attack thus permit an active intruder to claim to be the issuer of a signed message. A digital signature scheme is said to be vulnerable to destructive exclusive ownership property (DEO) If it is computationaly feasible for an intruder, given a public verification key and a pair of message and its valid signature relatively to the given public key (m, s), to compute a pair of signature and verification keys and a new message m such that s is a valid signature of m relatively to the new verification key. In this paper, we investigate and solve positively the problem of the decidability of symbolic cryptographic protocol analysis when the signature schemes employed in the concrete realisation have this two properties.
منابع مشابه
1 9 O ct 2 00 1 Substitution Delone Sets
Substitution Delone set families are families of Delone sets X = (X1, . . . ,Xn) which satisfy the inflation functional equation
متن کاملIdentification of specificity determining residues in enzymes using environment specific substitution tables
Environment speci c substitution tables have been used e ectively for distinguishing structural and functional constraints on proteins and thereby identify their active sites (Chelliah et al. (2004)). This work explores whether a similar approach can be used to identify speci city determining residues (SDRs) responsible for cofactor dependence, substrate speci city or subtle catalytic variation...
متن کاملReminiscences about numerical schemes
This preprint appeared firstly in Russian in 1997. Some truncated versions of this preprint were published in English and French, here a fully translated version is presented. The translation in English was done by O. V. Feodoritova and V. Deledicque to whom I express my gratitude. Key-words: Godunov’s Scheme, hyperbolic systems of conservation laws. ∗ Sobolev Institute of Mathematics, Novosibi...
متن کامل1 O ct 2 00 7 On potentially K r + 1 − U - graphical Sequences
X iv :0 71 0. 04 09 v1 [ m at h. C O ] 1 O ct 2 00 7 On potentially Kr+1 − U -graphical Sequences Chunhui Lai, Guiying Yan 1 Department of Mathematics, Zhangzhou Teachers College, Zhangzhou, Fujian 363000, P. R. of CHINA. e-mail: [email protected] 2 Center of Graph Theory, Combinatorics and Network, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 10008...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007