Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Rogue public key registration attack and the importance of 'proof of possession' in the PKI environment

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Younho-
dc.contributor.authorPark, Yongsu-
dc.contributor.authorKim, Heeyoul-
dc.contributor.authorHong, Seong-Min-
dc.contributor.authorYoon, Hyunsoo-
dc.date.accessioned2022-12-21T10:46:06Z-
dc.date.available2022-12-21T10:46:06Z-
dc.date.created2022-09-16-
dc.date.issued2006-08-
dc.identifier.issn0916-8532-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/181155-
dc.description.abstractThe security vulnerabilities of a number of provable secure proxy signature schemes are examined,with the assumption that users can register their public keys without having corresponding private keys. This assumption is different from that of a standard proxy signature in which the public keys of users are authentic. Under this assumption, both the Triple Schnorr scheme and Kang et al's scheme are shown to be vulnerable to a rogue public key registration attack. This attack gives an adversary the ability to generate a proxy signature without the valid agreement of the original signer. Moreover, it is shown that an adversary can manipulate the description of a delegated signing right at will. This work can be considered as an awakening to the importance of Proof of Possession (PoP) in the PKI environment, as in many cases certificate authorities do not require the PoP protocol, as has been stated [1].-
dc.language영어-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleRogue public key registration attack and the importance of 'proof of possession' in the PKI environment-
dc.typeArticle-
dc.contributor.affiliatedAuthorPark, Yongsu-
dc.identifier.doi10.1093/ietisy/e89-d.8.2452-
dc.identifier.scopusid2-s2.0-33747848597-
dc.identifier.wosid000239578100017-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E89D, no.8, pp.2452 - 2455-
dc.relation.isPartOfIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.titleIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.volumeE89D-
dc.citation.number8-
dc.citation.startPage2452-
dc.citation.endPage2455-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusPROTECTED SIGNATURE SCHEMES-
dc.subject.keywordPlusPROXY SIGNATURES-
dc.subject.keywordAuthorproxy signature-
dc.subject.keywordAuthordigital signature-
dc.subject.keywordAuthorcryptanalysis-
dc.identifier.urlhttps://search.ieice.org/bin/summary.php?id=e89-d_8_2452&category=D&year=2006&lang=E&abst=-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Park, Yong su photo

Park, Yong su
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE