DocumentCode :
511694
Title :
Security Analysis of Two RSA-Based Fair Document Exchange Protocols
Author :
Shao, Zuhua
Author_Institution :
Zhejiang Univ. of Sci. & Technol., Hangzhou, China
Volume :
1
fYear :
2009
fDate :
28-30 Oct. 2009
Firstpage :
55
Lastpage :
59
Abstract :
In 2005, A. Nenadic N. Zhang and Q. Shi proposed a new cryptographic primitive, called Verifiable and Recoverable Encryption of Signature VRES. Based on RSA-based VRES, they presented two variant protocols RSA-CEMD1 and RSA-CEMD2 for certified e-mail delivery with RSA receipts. They claimed that the protocols provided strong fairness to ensure that the recipient receives the e-mail if and only if the sender receives the receipt. Later, N. Zhang, Q. Shi, M. Merabti, and R. Askwith presented a practical and efficient fair document exchange protocol based on a verifiable and recoverable encryption of keys that is somewhat similar to the VRES. In this paper, we find that the VRES scheme is universal forgeable. Anyone can generate the false VRES for any message without the knowledge of any private key of the sender, the recipient and the TTP. It follows that the two variant protocols RSA-CEMD1, RSA-CEMD2 are all insecure. Meanwhile, we show that the document exchange protocol is not fair since the verifiable and recoverable encryption of keys is not recoverable.
Keywords :
cryptographic protocols; digital signatures; public key cryptography; RSA-CEMD1 protocol; RSA-CEMD2 protocol; VRES algorithm; certified e-mail delivery; fair document exchange protocols; verifiable and recoverable encryption of signature; Computer science; Conferences; Protocols; Security; RSA; certified e-mail delivery; cheat attack; fair exchange document; universal forgery;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Engineering, 2009. WCSE '09. Second International Workshop on
Conference_Location :
Qingdao
Print_ISBN :
978-0-7695-3881-5
Type :
conf
DOI :
10.1109/WCSE.2009.621
Filename :
5403438
Link To Document :
بازگشت