DocumentCode
511694
Title
Security Analysis of Two RSA-Based Fair Document Exchange Protocols
Author
Shao, Zuhua
Author_Institution
Zhejiang Univ. of Sci. & Technol., Hangzhou, China
Volume
1
fYear
2009
fDate
28-30 Oct. 2009
Firstpage
55
Lastpage
59
Abstract
In 2005, A. Nenadic N. Zhang and Q. Shi proposed a new cryptographic primitive, called Verifiable and Recoverable Encryption of Signature VRES. Based on RSA-based VRES, they presented two variant protocols RSA-CEMD1 and RSA-CEMD2 for certified e-mail delivery with RSA receipts. They claimed that the protocols provided strong fairness to ensure that the recipient receives the e-mail if and only if the sender receives the receipt. Later, N. Zhang, Q. Shi, M. Merabti, and R. Askwith presented a practical and efficient fair document exchange protocol based on a verifiable and recoverable encryption of keys that is somewhat similar to the VRES. In this paper, we find that the VRES scheme is universal forgeable. Anyone can generate the false VRES for any message without the knowledge of any private key of the sender, the recipient and the TTP. It follows that the two variant protocols RSA-CEMD1, RSA-CEMD2 are all insecure. Meanwhile, we show that the document exchange protocol is not fair since the verifiable and recoverable encryption of keys is not recoverable.
Keywords
cryptographic protocols; digital signatures; public key cryptography; RSA-CEMD1 protocol; RSA-CEMD2 protocol; VRES algorithm; certified e-mail delivery; fair document exchange protocols; verifiable and recoverable encryption of signature; Computer science; Conferences; Protocols; Security; RSA; certified e-mail delivery; cheat attack; fair exchange document; universal forgery;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Engineering, 2009. WCSE '09. Second International Workshop on
Conference_Location
Qingdao
Print_ISBN
978-0-7695-3881-5
Type
conf
DOI
10.1109/WCSE.2009.621
Filename
5403438
Link To Document