The Community for Technology Leaders
2011 14th IEEE International Conference on Computational Science and Engineering (2011)
Dalian, Liaoning China
Aug. 24, 2011 to Aug. 26, 2011
ISBN: 978-0-7695-4477-9
pp: 68-72
ABSTRACT
In Africacrypt 2010, Peng and Bao propose a batch proof and verification technique and apply it to design efficient range proof with practical small ranges. Their range proof employs a batch proof and verification technique by Chida and Yamamoto. We show that the batch proof and verification fails in security such that a malicious prover without the claimed knowledge can pass the verification. As a result, there is security concern for the range proof scheme as it may be vulnerable to the attack. However, it is illustrated in this paper that the attack must work under a condition and a simple countermeasure can fail the condition and prevent the attack in the range proof scheme.
INDEX TERMS
CITATION

F. Bao and K. Peng, "Analysing a Batch Range Proof to Address a Security Concern," 2011 14th IEEE International Conference on Computational Science and Engineering(CSE), Dalian, Liaoning China, 2011, pp. 68-72.
doi:10.1109/CSE.2011.26
96 ms
(Ver 3.3 (11022016))