Key substitution in the symbolic analysis of cryptographic protocols

4Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the new signature key. Schemes vulnerable to this attack thus permit an active intruder to claim to be the issuer of a signed message. In this paper, we investigate and solve positively the problem of the decidability of symbolic cryptographic protocol analysis when the signature schemes employed in the concrete realisation have this property. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Chevalier, Y., & Kourjieh, M. (2007). Key substitution in the symbolic analysis of cryptographic protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4855 LNCS, pp. 121–132). Springer Verlag. https://doi.org/10.1007/978-3-540-77050-3_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free