A new appraoch to server-aided secret computation

نویسندگان

  • Seong-Min Hong
  • Jun-Bum Shin
  • H. Lee-Kwang
  • Hyunsoo Yoon
چکیده

Server-Aided Secret Computation(SASC) protocol enables the client(smart card) to borrow the computing power from the server(un trusted auxiliary device like ATM) without revealing the secret information of the client. The previous approach is to decompose the client's secret information into many pieces and to reveal some of them to the server. It signiicantly accelerates the secret computation, however there are some problems. Firstly, many pieces that have linear relation enable an attacker to probabilistic active attack, and it causes the performance degradation of SASC protocol. Secondly, the amount of communication and the server's computation is very large and proportional to security parameters. In this paper, we investigate a new approach to SASC protocol for RSA signature generation. Our approach is to blind the client's secret information by using a series of random numbers rather than to decompose it. The proposed protocol is secure against all known attacks including the probabilistic active attack, and the number of modular multiplications required at the client is just half of those in the previous ones. Moreover, the time required at the server and the amount of communication are very small and irrespective of security parameters. Consequently, the total time required to generate RSA signature is expected to be less than half of that required in the previous protocols in any environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Probabilistic Active Attack on Server-Aided Secret Computation Protocols

SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) without revealing its secret information. In this paper, we propose a new active attack on server-aided secret computation protocols. We describe our attack by using Beguin and Quisquater’s protocol. (We modify the protocol...

متن کامل

A New Efficient Server-Aided RSA Secret Computation Protocol against Active Attacks

In the RSA signature scheme [17], the secret computation M mod N is the most time consuming operation, where N is the product of two large prime numbers and d is the secret key. To perform this operation is hard for the device with limited computation power, so Matsumoto et al. [13] proposed the idea of server-aided secret computation protocols. In a server-aided secret computation protocol, th...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

Security and Performance of Server-Aided RSA Computation Protocols

This paper investigates various security issues and provides possible improvements on server-aided RSA computation schemes, mainly focused on the twephase protocols, RSA-SlM and RSA-S$M, proposed by Matsumoto et d. [4]. We first present new active attacks on these protocols when the find result is not checked. A server-aided protocol is then proposed in which the client can check the computed s...

متن کامل

Active Trial-and-error Attack on SASC Protocols

SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) without revealing its secret information. In this paper, we propose a new active attack on server-aided secret computation protocols. We describe our attack by using Beguin and Quisquater’s protocol. (We modify the protocol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998