Improvement on Sui et al.'s Separable and Anonymous Key Issuing Protocol in ID-based Cryptosystem

被引:0
|
作者
Wang, Changji [1 ,2 ]
Li, Qin [1 ]
Yang, Xingfeng [1 ]
机构
[1] Sun Yat Sen Univ, Guangdong Prov Informat Secur Key Lab, Dept Comp Sci, Guangzhou 510275, Guangdong, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100039, Peoples R China
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2006年 / 6卷 / 5B期
基金
中国国家自然科学基金;
关键词
Improve Sui et al.'s separable and anonymous key issuing; protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To avoid the need of secure channel in ID-based public key systems (ID-PKC), Sui et al. proposed a separable and anonymous key issuing protocol in [1]. Recently, R. Gangishetti et al. showed that Sui et al.'s key issuing protocol suffers from the stolen verifier attack and incompetency of KGCs in [2]. However, R. Gangishetti et al. did not give any solutions to resist these attacks. In this paper, we improve Sui et al.'s separable and anonymous key issuing protocol, the improved protocol can resist the stolen verifier attack and remove the incompetency of KGCs.
引用
收藏
页码:161 / 165
页数:5
相关论文
共 50 条
  • [1] An improved anonymous ID-based key issuing protocol
    Cai, Yongquan
    Yan, Xiang
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 472 - +
  • [2] Cryptanalysis and improvement on an ID-based key issuing protocol
    Wang, Licheng
    Cao, Zhenfu
    Cao, Feng
    Qian, Haifeng
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 8 - +
  • [3] Cryptanalytic flaws in Oh et al.'s ID-based authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 458 - +
  • [4] Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Moon, Sangjae
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 64 - +
  • [5] Improvement on Meshram et al.'s ID-based cryptographic mechanism
    Pang, Liaojun
    Li, Huixian
    Pei, Qingqi
    Wang, Yumin
    INFORMATION PROCESSING LETTERS, 2013, 113 (19-21) : 789 - 792
  • [6] An efficient secure key issuing protocol in ID-based cryptosystems
    Gangishetti, R
    Gorantla, MC
    Das, ML
    Saxena, A
    Gulati, VP
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 674 - 678
  • [7] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [8] Weakness in Jung et al.'s ID-based conference key distribution scheme
    Nam, J
    Kim, S
    Won, D
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 213 - 218
  • [9] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
  • [10] Security analysis and improvement for key issuing schemes in ID-based cryptography
    Kwon, Saeran
    Lee, Sang-Ho
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 203 - 212