An Improvement of an Identity-Based Key Issuing Protocol

被引:0
|
作者
Shi, Weimin [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100022, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
Identity-based cryptography; key issuing protocol; key escrow problem;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In 2005, Sui et al. proposed two separable and anonymous identity-based key issuing schemes, but the impersonation attack is proposed to show that Sui el al.'s second protocol is not free from the key-escrow problem. In order to solve such problem, Feng Cao et al. proposed an improved scheme in 2006 However, in the paper, we find that Feng Cao el al.'s scheme is still vulnerable to the impersonation attack According, the current paper first shows the weakness of Feng Cao el al's improved scheme, and then proposes our improvement which reaches the goal of avoiding key escrow problem and enhances efficiency.
引用
收藏
页码:4518 / 4521
页数:4
相关论文
共 50 条
  • [1] An improvement of an identity-based key issuing protocol
    Cao, Feng
    Cao, Zhenfu
    Wang, Licheng
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 13 - +
  • [2] Identity-based key issuing protocol for ad hoc networks
    Ren, Yongjun
    Wang, Jiandong
    Zhang, Youdong
    Fang, Liming
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 917 - 921
  • [3] Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption
    Yang, Yanqing
    Wang, Jian
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 309 - 328
  • [4] Separable and anonymous identity-based key issuing
    Sui, AF
    Chow, SSM
    Hui, LCK
    Yiu, SM
    Chow, KP
    Tsang, WW
    Chong, CF
    Pun, KH
    Chan, HW
    11th International Conference on Parallel and Distributed Systems Workshops, Vol II, Proceedings,, 2005, : 275 - 279
  • [5] Threshold key issuing in identity-based cryptosystems
    Gangishetti, Raju
    Gorantla, M. Choudary
    Das, Manik Lal
    Saxena, Ashutosh
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 260 - 264
  • [6] Anonymous Key Issuing Protocol for Distributed Sakai-Kasahara Identity-based Scheme
    Siad, Amar
    Amara, Moncef
    PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 35 - 40
  • [7] A Practical Key Issuing Scheme in Identity-based Cryptosystem
    Wang, Changji
    Liu, Jing
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 454 - 457
  • [8] Improvement of Gunther's identity-based key exchange protocol
    Saeednia, S
    ELECTRONICS LETTERS, 2000, 36 (18) : 1535 - 1536
  • [9] Identity-based key issuing without secure channel in a broad area
    Kwon, Saeran
    Lee, Sang-Ho
    INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 30 - +
  • [10] A novel identity-based key issuing scheme based on interacting neural network
    Chen, TM
    Chen, B
    Cai, JM
    ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 2, PROCEEDINGS, 2005, 3497 : 637 - 642