Some active attacks on fast server-aided secret computation protocols for modular exponentiation View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

1996

AUTHORS

Shin-Jia Hwang , Chin-Chen Chang , Wei-Pang Yang

ABSTRACT

Four server-aided secret computation protocols, Protocols 1, 2, 3, and 4, for modular exponentiation were proposed by Kawamura and Shimbo in 1993. By these protocols, the client can easily compute the modular exponentiation Md mod N with the help of a powerful server, where N is the product of two large primes. To enhance the security, the client was suggested to use a verification scheme and a slight modification on each proposed protocol. In this paper, we propose two new active attacks to break Protocols 3 and 4, respectively. Even if Protocols 3 and 4 have included the slight modification and verification, the untrusted server can still obtain the secret data d. The client cannot detect these attacks by the proposed verification. To adopt these new attacks, the difficulty of finding the value of the secret data d will be decreased drastically. More... »

PAGES

215-227

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/bfb0032360

DOI

http://dx.doi.org/10.1007/bfb0032360

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1021643564


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan 300, ROC", 
          "id": "http://www.grid.ac/institutes/grid.260539.b", 
          "name": [
            "Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan 300, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hwang", 
        "givenName": "Shin-Jia", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan 621, ROC", 
          "id": "http://www.grid.ac/institutes/grid.412047.4", 
          "name": [
            "Institute of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan 621, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chang", 
        "givenName": "Chin-Chen", 
        "id": "sg:person.07467446705.09", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07467446705.09"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan 300, ROC", 
          "id": "http://www.grid.ac/institutes/grid.260539.b", 
          "name": [
            "Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan 300, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yang", 
        "givenName": "Wei-Pang", 
        "id": "sg:person.014374171260.51", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014374171260.51"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1996", 
    "datePublishedReg": "1996-01-01", 
    "description": "Four server-aided secret computation protocols, Protocols 1, 2, 3, and 4, for modular exponentiation were proposed by Kawamura and Shimbo in 1993. By these protocols, the client can easily compute the modular exponentiation Md mod N with the help of a powerful server, where N is the product of two large primes. To enhance the security, the client was suggested to use a verification scheme and a slight modification on each proposed protocol. In this paper, we propose two new active attacks to break Protocols 3 and 4, respectively. Even if Protocols 3 and 4 have included the slight modification and verification, the untrusted server can still obtain the secret data d. The client cannot detect these attacks by the proposed verification. To adopt these new attacks, the difficulty of finding the value of the secret data d will be decreased drastically.", 
    "editor": [
      {
        "familyName": "Dawson", 
        "givenName": "Ed", 
        "type": "Person"
      }, 
      {
        "familyName": "Goli\u0107", 
        "givenName": "Jovan", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/bfb0032360", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-60759-5", 
        "978-3-540-49363-1"
      ], 
      "name": "Cryptography: Policy and Algorithms", 
      "type": "Book"
    }, 
    "keywords": [
      "active attacks", 
      "modular exponentiation", 
      "untrusted server", 
      "powerful servers", 
      "secret computation", 
      "computation protocol", 
      "verification scheme", 
      "new attacks", 
      "large primes", 
      "server", 
      "attacks", 
      "data D", 
      "mod n", 
      "exponentiation", 
      "clients", 
      "verification", 
      "protocol", 
      "slight modification", 
      "security", 
      "computation", 
      "scheme", 
      "protocol 3", 
      "help", 
      "Shimbo", 
      "difficulties", 
      "protocol 1", 
      "Kawamura", 
      "modification", 
      "primes", 
      "products", 
      "values", 
      "D.", 
      "paper"
    ], 
    "name": "Some active attacks on fast server-aided secret computation protocols for modular exponentiation", 
    "pagination": "215-227", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1021643564"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/bfb0032360"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/bfb0032360", 
      "https://app.dimensions.ai/details/publication/pub.1021643564"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:36", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_110.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/bfb0032360"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/bfb0032360'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/bfb0032360'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/bfb0032360'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/bfb0032360'


 

This table displays all metadata directly associated to this object as RDF triples.

114 TRIPLES      23 PREDICATES      59 URIs      52 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/bfb0032360 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author N524c6df0ba9b40538fb12df8819fed7e
4 schema:datePublished 1996
5 schema:datePublishedReg 1996-01-01
6 schema:description Four server-aided secret computation protocols, Protocols 1, 2, 3, and 4, for modular exponentiation were proposed by Kawamura and Shimbo in 1993. By these protocols, the client can easily compute the modular exponentiation Md mod N with the help of a powerful server, where N is the product of two large primes. To enhance the security, the client was suggested to use a verification scheme and a slight modification on each proposed protocol. In this paper, we propose two new active attacks to break Protocols 3 and 4, respectively. Even if Protocols 3 and 4 have included the slight modification and verification, the untrusted server can still obtain the secret data d. The client cannot detect these attacks by the proposed verification. To adopt these new attacks, the difficulty of finding the value of the secret data d will be decreased drastically.
7 schema:editor N37ff5a41b6d54e9297cbd153e051909a
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nd2aefba5e1774023be9f36fb7d293a9f
12 schema:keywords D.
13 Kawamura
14 Shimbo
15 active attacks
16 attacks
17 clients
18 computation
19 computation protocol
20 data D
21 difficulties
22 exponentiation
23 help
24 large primes
25 mod n
26 modification
27 modular exponentiation
28 new attacks
29 paper
30 powerful servers
31 primes
32 products
33 protocol
34 protocol 1
35 protocol 3
36 scheme
37 secret computation
38 security
39 server
40 slight modification
41 untrusted server
42 values
43 verification
44 verification scheme
45 schema:name Some active attacks on fast server-aided secret computation protocols for modular exponentiation
46 schema:pagination 215-227
47 schema:productId N89f0566d62db4015ab2fad7c49f7b11c
48 Nc7c8bea59fce43e78fc159ed8c7008f3
49 schema:publisher Nfe38c676951046538d0e7b242ea617b7
50 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021643564
51 https://doi.org/10.1007/bfb0032360
52 schema:sdDatePublished 2022-05-10T10:36
53 schema:sdLicense https://scigraph.springernature.com/explorer/license/
54 schema:sdPublisher N2e86f2a48ea840c8a09253b9a0c16ba6
55 schema:url https://doi.org/10.1007/bfb0032360
56 sgo:license sg:explorer/license/
57 sgo:sdDataset chapters
58 rdf:type schema:Chapter
59 N05ae1d3f6f1744059a2278d140420efc rdf:first sg:person.07467446705.09
60 rdf:rest N2c62cf7c3d2b4638a7c95dd788f863f5
61 N2c62cf7c3d2b4638a7c95dd788f863f5 rdf:first sg:person.014374171260.51
62 rdf:rest rdf:nil
63 N2e86f2a48ea840c8a09253b9a0c16ba6 schema:name Springer Nature - SN SciGraph project
64 rdf:type schema:Organization
65 N3438b7a0704549feaad316de80579d57 schema:affiliation grid-institutes:grid.260539.b
66 schema:familyName Hwang
67 schema:givenName Shin-Jia
68 rdf:type schema:Person
69 N35699e68bbd44095825d9b337063a8f7 schema:familyName Golić
70 schema:givenName Jovan
71 rdf:type schema:Person
72 N37ff5a41b6d54e9297cbd153e051909a rdf:first N92a9ebf8e699463c8b6134a19557580d
73 rdf:rest Nde67ad3eb9b14b8ab9e389336213550d
74 N524c6df0ba9b40538fb12df8819fed7e rdf:first N3438b7a0704549feaad316de80579d57
75 rdf:rest N05ae1d3f6f1744059a2278d140420efc
76 N89f0566d62db4015ab2fad7c49f7b11c schema:name dimensions_id
77 schema:value pub.1021643564
78 rdf:type schema:PropertyValue
79 N92a9ebf8e699463c8b6134a19557580d schema:familyName Dawson
80 schema:givenName Ed
81 rdf:type schema:Person
82 Nc7c8bea59fce43e78fc159ed8c7008f3 schema:name doi
83 schema:value 10.1007/bfb0032360
84 rdf:type schema:PropertyValue
85 Nd2aefba5e1774023be9f36fb7d293a9f schema:isbn 978-3-540-49363-1
86 978-3-540-60759-5
87 schema:name Cryptography: Policy and Algorithms
88 rdf:type schema:Book
89 Nde67ad3eb9b14b8ab9e389336213550d rdf:first N35699e68bbd44095825d9b337063a8f7
90 rdf:rest rdf:nil
91 Nfe38c676951046538d0e7b242ea617b7 schema:name Springer Nature
92 rdf:type schema:Organisation
93 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
94 schema:name Information and Computing Sciences
95 rdf:type schema:DefinedTerm
96 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
97 schema:name Computation Theory and Mathematics
98 rdf:type schema:DefinedTerm
99 sg:person.014374171260.51 schema:affiliation grid-institutes:grid.260539.b
100 schema:familyName Yang
101 schema:givenName Wei-Pang
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014374171260.51
103 rdf:type schema:Person
104 sg:person.07467446705.09 schema:affiliation grid-institutes:grid.412047.4
105 schema:familyName Chang
106 schema:givenName Chin-Chen
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07467446705.09
108 rdf:type schema:Person
109 grid-institutes:grid.260539.b schema:alternateName Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan 300, ROC
110 schema:name Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan 300, ROC
111 rdf:type schema:Organization
112 grid-institutes:grid.412047.4 schema:alternateName Institute of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan 621, ROC
113 schema:name Institute of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan 621, ROC
114 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...