Common use of Impersonation Attack Clause in Contracts

Impersonation Attack. Motivation of impersonation attacks is to take place any of B-GKAP entity during the protocol execution. To do that, an attacker needs to be able to generate the signature of an entity. Since our models are based on [11], we also utilize ▇▇▇▇▇▇▇ signature scheme [54] for outputs of B-GKAP functions. As stated in [55] and [56], ▇▇▇▇▇▇▇ is secure against impersonation and related key attacks, respectively.

Appears in 2 contracts

Sources: Thesis Submission Agreement, Master's Thesis