An Active Attack on Protocols for Server-Aided RSA Signature Computation.
Gwoboa HorngPublished in: Inf. Process. Lett. (1998)
Keyphrases
- authentication protocol
- public key
- signature scheme
- session key
- private information retrieval
- digital signature
- secret key
- key exchange
- private key
- diffie hellman
- security analysis
- database
- application level
- authentication mechanism
- user authentication
- cryptographic protocols
- efficient computation
- blind signature
- standard model
- authentication scheme
- client server
- lightweight
- security protocols
- ddos attacks
- key distribution
- single server
- active databases
- signature recognition
- modular exponentiation
- wireless networks
- operating system