DocumentCode :
3623849
Title :
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol
Author :
Piotr Borzecki;Jedrzej Kabarowski;Przemyslaw Kubiak;Miroslaw Kutylowski;Filip Zagorski
Author_Institution :
University of Wroclaw, Poland
fYear :
2006
Firstpage :
26
Lastpage :
26
Abstract :
During designing of cryptographic protocols, their participants are usually identified with software or hardware they use. However, these supporting tools are not verified at the protocol level. Such carelessness opens the door to kleptographic (SETUP) attacks. In this paper we design such an attack on the classical Benaloh-Tuinstra election protocol. One of the technical tools developed in the paper is a new variant of a Diffie-Hellman SETUP attack, in which Kronecker Decomposition of the group is not known to the attacker. This is especially the case of Goldwasser-Micali cryptosystem.
Keywords :
"Cryptographic protocols","Public key cryptography","Hardware","Protection","Mathematics","Computer science","Nominations and elections","Security","Manufacturing","Public key"
Publisher :
ieee
Conference_Titel :
Systems and Networks Communications, 2006. ICSNC ´06. International Conference on
Print_ISBN :
0-7695-2699-3
Type :
conf
DOI :
10.1109/ICSNC.2006.50
Filename :
4041541
Link To Document :
بازگشت