loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Kun Peng and Feng Bao

Affiliation: Institute for Infocomm Research, Singapore

Keyword(s): Attack, Non-membership proof.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Information and Systems Security ; Public Key Crypto Applications

Abstract: An accumulator system used for a special application of anonymous credential is extended by Li et al to a much wider range of applications: membership proof and non-membership proof. Given a committed secret integer and a public finite set of prime integers, two proof protocols, membership proof and non-membership proof are proposed in the extended scheme. The former proves that the integer is in the set when it is really in, while the latter proves that the integer is not in the set when it is really not in. Although the original accumulator technique works well in its appointed special application, the extension is insecure and vulnerable to attacks. Several attacks against membership proof and non-membership proof in the extended work is proposed in this paper to show its vulnerability in security. The attacks show that an attacker can employ various methods to give membership proof to an integer not in the set and non-membership proof to an integer in the set.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.135.184.27

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Peng, K. and Bao, F. (2010). VULNERABILITY OF A NON-MEMBERSHIP PROOF SCHEME. In Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT; ISBN 978-989-8425-18-8; ISSN 2184-3236, SciTePress, pages 419-422. DOI: 10.5220/0002912904190422

@conference{secrypt10,
author={Kun Peng. and Feng Bao.},
title={VULNERABILITY OF A NON-MEMBERSHIP PROOF SCHEME},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT},
year={2010},
pages={419-422},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002912904190422},
isbn={978-989-8425-18-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT
TI - VULNERABILITY OF A NON-MEMBERSHIP PROOF SCHEME
SN - 978-989-8425-18-8
IS - 2184-3236
AU - Peng, K.
AU - Bao, F.
PY - 2010
SP - 419
EP - 422
DO - 10.5220/0002912904190422
PB - SciTePress