Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism
暂无分享,去创建一个
At ESORICS 2017, Buldas et al. proposed an efficient (software only) server supported signature scheme, geared to mobile devices, termed Smart–ID. A major component of their design is a clone detection mechanism, which allows a server to detect the existence of clones of a client’s private key share. We point out a flaw in this mechanism. We show that, under a realistic race condition, an attacker who holds a password camouflaged private share can launch an online dictionary attack such that (i) if all its password guesses are wrong, it is very likely that the attack will not be detected, and (ii) if one of its guesses is correct, it can generate signatures on messages of its choice, and the attack will not be detected. We propose an improvement of Smart–ID to thwart the attack we present.
[1] Ahto Buldas,et al. Server-Supported RSA Signatures for Mobile Devices , 2017, ESORICS.
[2] Ivan Damgård,et al. On the Security of Distributed Multiprime RSA , 2014, ICISC.