Cryptanalysis and improvement on an ID-based key issuing protocol

被引:0
|
作者
Wang, Licheng [1 ]
Cao, Zhenfu [1 ]
Cao, Feng [1 ]
Qian, Haifeng [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, 1954 Huashan Rd, Shanghai 200030, Peoples R China
来源
FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2 | 2006年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/IMSCCS.2006.205
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we analyze an ID-based key issuing protocol due to Gangishetti et al., designed for eliminating the need of secure channel between PKG and users and avoiding the key escrow problem. Their protocol consists of five sub-protocols, namely System Setup, System Public Key Setup, Key Issuing, Key Securing and Key Retrieving. We show that both the Key Issuing and the Key Securing sub-protocols suffer from impersonation attacks. Further we present an improved key issuing protocol which is proved to be secure against adaptive chosen message attack in the random oracle model under the CDH assumption.
引用
收藏
页码:8 / +
页数:2
相关论文
共 50 条
  • [1] An improved anonymous ID-based key issuing protocol
    Cai, Yongquan
    Yan, Xiang
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 472 - +
  • [2] An efficient secure key issuing protocol in ID-based cryptosystems
    Gangishetti, R
    Gorantla, MC
    Das, ML
    Saxena, A
    Gulati, VP
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 674 - 678
  • [3] Cryptanalysis and improvement on an threshold key issuing protocol
    Zhang Bo
    Xu QiuLiang
    Liu Xin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 729 - 732
  • [4] Security analysis and improvement for key issuing schemes in ID-based cryptography
    Kwon, Saeran
    Lee, Sang-Ho
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 203 - 212
  • [5] Improvement on Sui et al.'s Separable and Anonymous Key Issuing Protocol in ID-based Cryptosystem
    Wang, Changji
    Li, Qin
    Yang, Xingfeng
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 161 - 165
  • [6] Secure key issuing scheme in ID-based cryptography with revocable ID
    Tanwar, Sarvesh
    Kumar, Anil
    INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 676 - 685
  • [7] Analysis and improvement of an ID-based authenticated key agreement protocol
    Wang, Xiao-Fen
    Chen, Yuan
    Xiao, Guo-Zhen
    Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21
  • [8] Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    Wang, Hui
    JOURNAL OF COMPUTERS, 2012, 7 (06) : 1345 - 1352
  • [10] Improvement of an ID-based deniable authentication protocol
    Lin T.-C.
    Lin, Tzu-Chun (lintc@fcu.edu.tw), 2018, Univ. of Electronic Science and Technology of China (16): : 139 - 144