Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things" - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue IEEE Internet of Things Journal Année : 2020

Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"

Résumé

Internet of Things (IoT) devices have grown in popularity over the past few years. The RSA public-key cryptographic primitive is time-consuming for resource-constrained IoT. Recently, Zhang, Yu, Tian, Tong, Lin, Ge and Wang proposed a two-party outsourcing protocol between a client and a server for RSA decryption in IoT. It relies on the Chinese Remainder Theorem as proposed by Quisquater and Couvreur in 1982 and is very efficient. We show that their protocol does not achieve the claimed security guarantees: (1) the (secret) decryption exponent, the plaintext and the factorization of the RSA modulus are revealed to a passive adversary, and (2) a malicious server can make the client accept an (invalid) value of its choice as the result of the delegated computation.
Fichier principal
Vignette du fichier
comment-iot-final.pdf (213.61 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02876134 , version 1 (20-06-2020)

Identifiants

Citer

Damien Vergnaud. Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things". IEEE Internet of Things Journal, In press, 7 (11), pp.11327-11329. ⟨10.1109/JIOT.2020.3004346⟩. ⟨hal-02876134⟩
76 Consultations
175 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More