Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version) - Archive ouverte HAL Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2007

Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version)

Résumé

Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the new signature key. A digital signature scheme is said to be vulnerable to destructive exclusive ownership property (DEO) If it is computationaly feasible for an intruder, given a public verification key and a pair of message and its valid signature relatively to the given public key, to compute a pair of signature and verification keys and a new message such that the given signature appears to be valid for the new message relatively to the new verification key. In this paper, we prove decidability of the insecurity problem of cryptographic protocols where the signature schemes employed in the concrete realisation have this two properties.
Fichier principal
Vignette du fichier
tech.pdf (265.62 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00183337 , version 1 (30-10-2007)

Identifiants

Citer

Yannick Chevalier, Mounira Kourjieh. Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version). 2007. ⟨hal-00183337⟩
110 Consultations
39 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More