Abstract:
In ITST2006, Chen et al. presented two server-aided public key generation protocols for low-power devices and claimed that their protocols secure against collusion attack...Show MoreMetadata
Abstract:
In ITST2006, Chen et al. presented two server-aided public key generation protocols for low-power devices and claimed that their protocols secure against collusion attack. In this paper, we point that if the servers collude with each other, those servers could obtain low-power devices' secret information, and they can get the plaintext from any ciphertext. We also present an improved server-aided standard RSA key generation protocol against the collusion attack.
Published in: 2008 ISECS International Colloquium on Computing, Communication, Control, and Management
Date of Conference: 03-04 August 2008
Date Added to IEEE Xplore: 29 August 2008
Print ISBN:978-0-7695-3290-5