Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Kleptographic attacks on e-auction schemes

In: Tatra Mountains Mathematical Publications, vol. 41, no. 3
Marcin Gogolewski - Marcin Gomułkiewicz - Przemys Kubiak - Jarosław Grząślewicz - Mirosław Kutyłowski - Anna Lauks
Detaily:
Rok, strany: 2008, 47 - 64
O článku:
In this paper we examine resistance of electronic auctions protocols to kleptographic attacks. It turns out that these protocols are vulnerable to threats posed by kleptography and practical consequences might be profound. A party controlling production of software or hardware used in an auction may get access to complete data on user's decisions and construct his profile through \emph{passive} observation only. At the same time, no other party can retrieve such data (even \emph{after} reverse engineering the devices) On technical side we show that an adversary using kleptography might deploy a single elliptic curve over a prime field to RSA key generation. This approach gives a shorter key than in the case of a twisted pair of elliptic curves over a binary field. This improves the attacks presented by Young and Yung. We also show that in case of tamper resistant devices the goals of kleptography might be achieved without public key algorithms, but through usage of hash functions.
Ako citovať:
ISO 690:
Gogolewski, M., Gomułkiewicz, M., Kubiak, P., Grząślewicz, J., Kutyłowski, M., Lauks, A. 2008. Kleptographic attacks on e-auction schemes. In Tatra Mountains Mathematical Publications, vol. 41, no.3, pp. 47-64. 1210-3195.

APA:
Gogolewski, M., Gomułkiewicz, M., Kubiak, P., Grząślewicz, J., Kutyłowski, M., Lauks, A. (2008). Kleptographic attacks on e-auction schemes. Tatra Mountains Mathematical Publications, 41(3), 47-64. 1210-3195.