首页> 外文期刊>The Computer journal >Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol
【24h】

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol

机译:从阈值知识证明协议阈值环签名的错误实例化

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we point out some faulty instantiations of threshold ring signatures (TRS) based on the threshold proof-of-knowledge (TPoK) protocol. Although a TRS can be regarded as the non-interactive version of the TPoK, the computational domains of the variables should be carefully chosen. We show that by choosing some inappropriate domains, two such instantiations suffer from forgery and anonymity attacks. Our attacks rely on algebraic techniques which involve solving some particular instances of the well-known subset sum problem. While we focus our attacks on two particular instantiations of the TRS, they are generic and are applicable to other schemes with the same choice of domains or a similar structure. We believe this paper can act as an important security remark on the design of future TRS schemes.
机译:在本文中,我们指出了基于阈值知识证明(TPoK)协议的阈值环签名(TRS)的一些错误实例。尽管可以将TRS视为TPoK的非交互式版本,但应谨慎选择变量的计算域。我们表明,通过选择一些不适当的域,两个这样的实例遭受了伪造和匿名攻击。我们的攻击依赖于涉及解决众所周知的子集和问题的某些特定情况的代数技术。虽然我们将攻击重点放在TRS的两个特定实例上,但它们是通用的,适用于具有相同域选择或相似结构的其他方案。我们认为本文可以作为未来TRS方案设计的重要安全说明。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号