Security Vulnerability of ID-Based Key Sharing Schemes
スポンサーリンク
概要
- 論文の詳細を見る
Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any users secret key.
- (社)電子情報通信学会の論文
- 2009-10-01
著者
-
Hwang Jungyeon
Electronics And Telecommunications Research Institute (etri)
-
Susilo Willy
Centre For Computer And Information Security Research School Of Computer Science And Software Engine
-
Youn Taek-young
Graduate School Of Information Management And Security Korea University
関連論文
- Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties
- An Efficient Signature Scheme with Fast Online Signing
- Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
- Security Vulnerability of ID-Based Key Sharing Schemes