Rogue public key registration attack and the importance of 'proof of possession' in the PKI environment
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Younho | - |
dc.contributor.author | Park, Yongsu | - |
dc.contributor.author | Kim, Heeyoul | - |
dc.contributor.author | Hong, Seong-Min | - |
dc.contributor.author | Yoon, Hyunsoo | - |
dc.date.accessioned | 2022-12-21T10:46:06Z | - |
dc.date.available | 2022-12-21T10:46:06Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2006-08 | - |
dc.identifier.issn | 0916-8532 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/181155 | - |
dc.description.abstract | The security vulnerabilities of a number of provable secure proxy signature schemes are examined,with the assumption that users can register their public keys without having corresponding private keys. This assumption is different from that of a standard proxy signature in which the public keys of users are authentic. Under this assumption, both the Triple Schnorr scheme and Kang et al's scheme are shown to be vulnerable to a rogue public key registration attack. This attack gives an adversary the ability to generate a proxy signature without the valid agreement of the original signer. Moreover, it is shown that an adversary can manipulate the description of a delegated signing right at will. This work can be considered as an awakening to the importance of Proof of Possession (PoP) in the PKI environment, as in many cases certificate authorities do not require the PoP protocol, as has been stated [1]. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | Rogue public key registration attack and the importance of 'proof of possession' in the PKI environment | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, Yongsu | - |
dc.identifier.doi | 10.1093/ietisy/e89-d.8.2452 | - |
dc.identifier.scopusid | 2-s2.0-33747848597 | - |
dc.identifier.wosid | 000239578100017 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E89D, no.8, pp.2452 - 2455 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.citation.title | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.citation.volume | E89D | - |
dc.citation.number | 8 | - |
dc.citation.startPage | 2452 | - |
dc.citation.endPage | 2455 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | PROTECTED SIGNATURE SCHEMES | - |
dc.subject.keywordPlus | PROXY SIGNATURES | - |
dc.subject.keywordAuthor | proxy signature | - |
dc.subject.keywordAuthor | digital signature | - |
dc.subject.keywordAuthor | cryptanalysis | - |
dc.identifier.url | https://search.ieice.org/bin/summary.php?id=e89-d_8_2452&category=D&year=2006&lang=E&abst= | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.