{"title":"Cryptanalysis of SP2DAS and 3PDA, Two Data Aggregation Schemes for Smart Grid","authors":"Hamid Amiryousefi, Z. Ahmadian","doi":"10.1109/ISCISC48546.2019.8985140","DOIUrl":null,"url":null,"abstract":"This paper analyses the security of two recently proposed privacy preserving data aggregation schemes, called SP2DAS and 3PDA. We show that, for both of these protocols, despite the designers' claims, there are efficient forgery attacks on the signature schemes used in. We present a selective forgery attack on the signature scheme of SP2DAS in the key-only attack model and a selective forgery attack on the 3PDA's signature scheme in the known-message attack model, requiring only two pairs of message-signature. Our results show that in both of these schemes, the attacker can inject any arbitrary faulty data into the data aggregated by the network, without being detected, which is a serious threat to the performance of the whole network.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC48546.2019.8985140","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper analyses the security of two recently proposed privacy preserving data aggregation schemes, called SP2DAS and 3PDA. We show that, for both of these protocols, despite the designers' claims, there are efficient forgery attacks on the signature schemes used in. We present a selective forgery attack on the signature scheme of SP2DAS in the key-only attack model and a selective forgery attack on the 3PDA's signature scheme in the known-message attack model, requiring only two pairs of message-signature. Our results show that in both of these schemes, the attacker can inject any arbitrary faulty data into the data aggregated by the network, without being detected, which is a serious threat to the performance of the whole network.