Security Analysis of a Path Validation Scheme With Constant-Size Proof

被引:3
作者
Wu, Yangyang [1 ,2 ]
Jiang, Changsong [1 ,2 ]
Xu, Chunxiang [1 ,2 ]
Chen, Kefei [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Yangtze Delta Reg Inst Huzhou, Huzhou 313001, Peoples R China
[3] Hangzhou Normal Univ, Dept Math, Hangzhou 310027, Peoples R China
关键词
Forgery; Encryption; Research and development; Public key cryptography; Forensics; Message authentication; Mathematics; Cryptoanalysis; path validation; proof forgery;
D O I
10.1109/TIFS.2021.3101043
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We analyze a path validation scheme with constant-size proof (published in IEEE Transactions on Information Forensics and Security) and demonstrate that this scheme fails to achieve unforgeability. An adversary can forge a valid proof with a non-negligible probability.
引用
收藏
页码:4246 / 4248
页数:3
相关论文
共 5 条
  • [1] Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation
    Bu, Kai
    Laird, Avery
    Yang, Yutian
    Cheng, Linfeng
    Luo, Jiaqing
    Li, Yingjiu
    Ren, Kui
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (05)
  • [2] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [3] Atomos: Constant-Size Path Validation Proof
    He, Anxiao
    Bu, Kai
    Li, Yucong
    Chida, Eikoh
    Gu, Qianping
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3832 - 3847
  • [4] Lightweight Source Authentication and Path Validation
    Kim, Tiffany Hyun-Jin
    Basescu, Cristina
    Jia, Limin
    Lee, Soo Bum
    Hu, Yih-Chun
    Perrig, Adrian
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (04) : 271 - 282
  • [5] Naous Jad., 2011, Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies, page, P30