par Markowitch, Olivier ;Saeednia, Shahrokh
Référence Information processing letters, 87, 3, page (169-171)
Publication Publié, 2003-08
Article révisé par les pairs
Résumé : In this paper we present an attack on a fair exchange protocol proposed by Wu and Varadharajan. We show that, after two executions of the protocol, a dishonest participant can collect enough information in order to obtain some secret information of the other participant. This precisely allows him to compute the final signature of the other participant in all subsequent executions of the protocol, without disclosing his own signature. © 2003 Elsevier B.V. All rights reserved.