Impersonation Attack on a Strong ID-Based Key Distribution
スポンサーリンク
概要
- 論文の詳細を見る
Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.
- (社)電子情報通信学会の論文
- 2008-08-01
著者
-
LEE Donghoon
Graduate school of Hanyang University
-
Lee Donghoon
Graduate School Of Information Management And Security (cist)
-
HWANG JungYeon
Graduate School of Information Management and Security (CIST)
-
LIM Jongin
Graduate School of Information Management and Security (CIST)
関連論文
- Spray behavior and distribution characteristics in the flow field of injector used for HC-DeNOx catalyst system : Part2 : Theory of Atomization
- Impersonation Attack on a Strong ID-Based Key Distribution
- Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties
- An Efficient Signature Scheme with Fast Online Signing
- Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
- Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
- Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pases Usine Runtime Execution