TY - GEN
T1 - Cryptanalysis and improvement on an ID-based key issuing protocol
AU - Wang, Licheng
AU - Cao, Zhenfu
AU - Cao, Feng
AU - Qian, Haifeng
PY - 2006
Y1 - 2006
N2 - In this paper we analyze an ID-based key issuing protocol due to Gangishetti et al., designed for eliminating the need of secure channel between PKG and users and avoiding the key escrow problem. Their protocol consists of five sub-protocols, namely System Setup, System Public Key Setup, Key Issuing, Key Securing and Key Retrieving. We show that both the Key Issuing and the Key Securing subprotocols suffer from impersonation attacks. Further, we present an improved key issuing protocol which is proved to be secure against adaptive chosen message attack in the random oracle model under the CDH assumption.
AB - In this paper we analyze an ID-based key issuing protocol due to Gangishetti et al., designed for eliminating the need of secure channel between PKG and users and avoiding the key escrow problem. Their protocol consists of five sub-protocols, namely System Setup, System Public Key Setup, Key Issuing, Key Securing and Key Retrieving. We show that both the Key Issuing and the Key Securing subprotocols suffer from impersonation attacks. Further, we present an improved key issuing protocol which is proved to be secure against adaptive chosen message attack in the random oracle model under the CDH assumption.
UR - https://www.scopus.com/pages/publications/33845572855
U2 - 10.1109/IMSCCS.2006.252
DO - 10.1109/IMSCCS.2006.252
M3 - 会议稿件
AN - SCOPUS:33845572855
SN - 0769525814
SN - 9780769525815
T3 - First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
SP - 8
EP - 12
BT - First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
T2 - First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
Y2 - 20 April 2006 through 24 April 2006
ER -