Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement
スポンサーリンク
概要
- 論文の詳細を見る
Hwang-Lo-Lin proposed a user identification scheme [3] based on the Maurer-Yacobi scheme [6] that is suitable for application to the mobile environment. Hwang-Lo-Lin argued that their scheme is secure against any attack. Against the Hwang-Lo-Lin argument, Liu-Horng-Liu showed that the Hwang-Lo-Lin scheme is insecure against a Liu-Horng-Liu attack mounted by an eavesdrop attacker. However, Liu-Horng-Liu did not propose any improved version of the original identification scheme which is still secure against the Liu-Horng-Liu attack. In this paper, we propose an identification scheme that can solve this problem and a non-interactive public key distribution scheme also.
- (社)電子情報通信学会の論文
- 2008-03-01
著者
-
Chun Kilsoo
Kisa (korea Information Security Agency)
-
Park Haeryong
Kisa (korea Internet & Security Agency) Seoul Kor
-
Park Haeryong
Kisa (korea Internet & Security Agency)
-
AHN Seungho
Chonnam National University
-
PARK Haeryong
KISA (Korea Information Security Agency)
関連論文
- Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement
- Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme
- Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and Key Distribution Scheme