完整後設資料紀錄
DC 欄位語言
dc.contributor.authorHwang, SJen_US
dc.contributor.authorChang, CCen_US
dc.contributor.authorYang, WPen_US
dc.date.accessioned2014-12-08T15:02:57Z-
dc.date.available2014-12-08T15:02:57Z-
dc.date.issued1996en_US
dc.identifier.isbn3-540-60759-5en_US
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/11536/1561-
dc.description.abstractFour server-aided secret computation protocols, Protocols 1, 2, 3, and 4, for modular exponentiation were proposed by Kawamura and Shimbo in 1993. By these protocols, the client can easily compute the modular exponentiation M(d) mod N with the help of a powerful server, where N is the product of two large primes. To enhance the security, the client was suggested to use a verification scheme and a slight modification on each proposed protocol. In this paper, we propose two new active attacks to break Protocols 3 and 4, respectively. Even if Protocols 3 and 4 have included the slight modification and verification, the untrusted server can still obtain the secret data d. The client cannot detect these attacks by the proposed verification. To adopt these new attacks, the difficulty of finding the value of the secret data d will be decreased drastically.en_US
dc.language.isoen_USen_US
dc.subjectserver-aided secret computation protocolen_US
dc.subjectactive attacken_US
dc.subjectcryptographyen_US
dc.subjectmodular exponentiationen_US
dc.titleSome active attacks on fast server-aided secret computation protocols for modular exponentiationen_US
dc.typeArticle; Proceedings Paperen_US
dc.identifier.journalCRYPTOGRAPHY: POLICY AND ALGORITHMSen_US
dc.citation.volume1029en_US
dc.citation.spage215en_US
dc.citation.epage227en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:A1996BF80T00018-
顯示於類別:會議論文