Attacks on secure logging schemes

4Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present four attacks on three cryptographic schemes intended for securing log files against illicit retroactive modification. Our first two attacks regard the LogFAS scheme by Yavuz et al. (Financial Cryptography 2012), whereas our third and fourth attacks break the BM- and AR-FssAgg schemes by Ma (AsiaCCS 2008). All schemes have an accompanying security proof, seemingly contradicting the existence of attacks. We point out flaws in these proofs, resolving the contradiction.

Cite

CITATION STYLE

APA

Hartung, G. (2017). Attacks on secure logging schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10322 LNCS, pp. 268–284). Springer Verlag. https://doi.org/10.1007/978-3-319-70972-7_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free