Active trial-and-error attack on SASC protocols

Heeyoul Kim, Younho Lee, Seong Min Hong, Hyunsoo Yoon

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) without revealing its secret information. In this paper, we propose a new active attack on server-aided secret computation protocols. We describe our attack by using Beguin and Quisquater's protocol. (We modify the protocol in order to immunize it against Nguyen and Stern's lattice reduction attack.) The proposed attack reduces the search space P to 1/p + pP, where 0 < p < 1. It is 2√ P for optimal p. Practically, it effectively threatens SASC protocols because an attacker can choose an appropriate value p according to the situation. Therefore, the security parameters in the existing SASC protocols must be reconsidered.

Original languageEnglish
Pages (from-to)105-110
Number of pages6
JournalInternational Journal of Network Security
Volume2
Issue number2
StatePublished - 2006

Keywords

  • Active attack
  • SASC protocol
  • Smart card

Fingerprint

Dive into the research topics of 'Active trial-and-error attack on SASC protocols'. Together they form a unique fingerprint.

Cite this