Security

Attacking an OT-Based Blind Signature Scheme

Download Now Free registration required

Executive Summary

In this paper, the authors describe an attack against one of the Oblivious-Transfer-based blind signatures scheme, proposed in. An attacker with a primitive capability of producing specific-range random numbers, while exhibiting a partial MITM behavior, is able to corrupt the communication between the protocol participants. The attack is quite efficient as it leads to a protocol communication corruption and has a sound-minimal computational cost. They propose a solution to fix the security flaw. Oblivious Transfer (OT) constitutes a powerful tool used today in modern cryptography. In the first introduction of the OT1 mechanism by Rabin, it is assumed that in a communication system, Alice transmit to Bob a two-part message, where only the one part is the secret that Alice wants to share.

  • Format: PDF
  • Size: 272.72 KB