|
Attacks on digital signature schemes not accounted by the common security definitions, and countermeasures
V. D. Nikolaev CryptoPro, LLC, Moscow
Abstract:
The implementation of the so called duplicate signature key selection attack on different digital signature schemes is discussed. We discuss also the usage of this attack for breaking some cryptographic protocols based on vulnerable signature schemes. Countermeasures for preventing this attack at the scheme-level and protocol-level are considered also.
Key words:
digital signature, DSKS, cryptographic protocols, provable security.
Received 08.IX.2015
Citation:
V. D. Nikolaev, “Attacks on digital signature schemes not accounted by the common security definitions, and countermeasures”, Mat. Vopr. Kriptogr., 7:1 (2016), 93–118
Linking options:
https://www.mathnet.ru/eng/mvk177https://doi.org/10.4213/mvk177 https://www.mathnet.ru/eng/mvk/v7/i1/p93
|
Statistics & downloads: |
Abstract page: | 630 | Full-text PDF : | 856 | References: | 43 |
|