Resilience against Xxxxx Attacks. The Xxxxx attack cannot be mounted as in Xxxx’x scheme. Consider that m private keys KC1M1 , · · · , KCmM1 and the corresponding public keys VC1 , · · · , VCm associated with one of the master keys M1 have been obtained. The attacker chooses a public key IDX seed sX1 and constructs the public key VX1 as a Vandermonde column vector, such that,
Appears in 2 contracts
Samples: citeseerx.ist.psu.edu, mdpi-res.com
Resilience against Xxxxx Attacks. The Xxxxx attack cannot be mounted as in Xxxx’x scheme. Consider that m private keys KC1M1 , · · · , KCmM1 and the corresponding public keys VC1 , · · · , VCm associated with one of the master keys M1 have been obtained. The attacker chooses a public key IDX seed sX1 and constructs the public key VX1 as a Vandermonde column vector, such that, VX1 = α11 VC1 + · · · + α1m VCm (mod q) (10) The coefficients α11 , · · · , α1m can be obtained and used to construct the private key associated with M1 and VX1 ,
Appears in 2 contracts
Samples: res.mdpi.com, pdfs.semanticscholar.org