The security of the BLT signature scheme with practical implementation issues
DOI:
https://doi.org/10.54654/isj.v2i14.146Keywords:
Lược đồ chữ ký BLT, hạ tầng KSI, giả mạo tồn tại, tính chống chối bỏ, cây băm Merkle. the BLT signature scheme, KSI infrastructure, non-repudiation, Merkle tree.Tóm tắt
Abstract—KSI infrastructure is a time-stamping and server-based signature solution deployed in Estonia to provide the integrity and timing information of data. With the goal of providing a personal signature that does not depend on the long-term secrecy of signing keys, Buldas et al. have proposed a BLT scheme that is based on the KSI infrastructure. Although Buldas et al. have shown that the (modified) BLT scheme is secure in the theoretical model, the fact that its practical implementation does not follow that description. In this paper, we will evaluate and provide two attack scenarios if the BLT schema is implemented in such a way, and then propose a solution to that problem.
Tóm tắt—Hạ tầng KSI là một giải pháp chữ ký dựa trên máy chủ chứa thông tin thời gian được thử nghiệm triển khai ở Estonia để cung cấp tính toàn vẹn và thông tin về thời gian của dữ liệu.Với mục tiêu tạo ra một chữ ký số cá nhân mà không phụ thuộc vào tính bí mật lâu dài của các khóa ký, Buldas và các cộng sự đã đề xuất lược đồ BLT dựa trên nền của hạ tầng KSI. Mặc dù, Buldas và các cộng sự đã chỉ ra rằng lược đồ BLT (sửa đổi) là an toàn trong mô hình lý thuyết, nhưng triển khai thực tế của lược đồ này không hoàn toàn tuân theo mô tả đó. Trong bài báo này, chúng tôi sẽ đánh giá và đưa ra hai kịch bản tấn công nếu lược đồ BLT được triển khai như vậy, và sau đó đề xuất một giải pháp cho vấn đề đó.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).