Asymmetric subversion attacks on signature schemes
From MaRDI portal
Publication:1784469
DOI10.1007/978-3-319-93638-3_22zbMATH Open1444.94087OpenAlexW2807758601MaRDI QIDQ1784469FDOQ1784469
Authors: Chi Liu, Rongmao Chen, Yi Wang, Yongjun Wang
Publication date: 26 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-93638-3_22
Recommendations
- Subversion-resilient signatures: definitions, constructions and applications
- Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog
- Protecting electronic signatures in case of key leakage
- Cliptography: clipping the power of kleptographic attacks
- Threshold kleptographic attacks on discrete logarithm based signatures
Cited In (8)
- Subversion-resilient signatures: definitions, constructions and applications
- Security of the SM2 signature scheme against generalized key substitution attacks
- Practical algorithm substitution attack on extractable signatures
- Security of auditing protocols against subversion attacks
- Subverting decryption in AEAD
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
- Subversion-resilient signatures without random oracles
This page was built for publication: Asymmetric subversion attacks on signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784469)