Download Now Free registration required
In this paper, the authors describe an attack against one of the Oblivious-Transfer-based blind signatures scheme, proposed in. An attacker with a primitive capability of producing specific-range random numbers, while exhibiting a partial MITM behavior, is able to corrupt the communication between the protocol participants. The attack is quite efficient as it leads to a protocol communication corruption and has a sound-minimal computational cost. They propose a solution to fix the security flaw. Oblivious Transfer (OT) constitutes a powerful tool used today in modern cryptography. In the first introduction of the OT1 mechanism by Rabin, it is assumed that in a communication system, Alice transmit to Bob a two-part message, where only the one part is the secret that Alice wants to share.
- Format: PDF
- Size: 272.72 KB