Cryptanalysis and improvement on an ID-based key issuing protocol

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper we analyze an ID-based key issuing protocol due to Gangishetti et al., designed for eliminating the need of secure channel between PKG and users and avoiding the key escrow problem. Their protocol consists of five sub-protocols, namely System Setup, System Public Key Setup, Key Issuing, Key Securing and Key Retrieving. We show that both the Key Issuing and the Key Securing subprotocols suffer from impersonation attacks. Further, we present an improved key issuing protocol which is proved to be secure against adaptive chosen message attack in the random oracle model under the CDH assumption.

Original languageEnglish
Title of host publicationFirst International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
Pages8-12
Number of pages5
DOIs
StatePublished - 2006
Externally publishedYes
EventFirst International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06 - Hangzhou, Zhejiang, China
Duration: 20 Apr 200624 Apr 2006

Publication series

NameFirst International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
Volume2

Conference

ConferenceFirst International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
Country/TerritoryChina
CityHangzhou, Zhejiang
Period20/04/0624/04/06

Fingerprint

Dive into the research topics of 'Cryptanalysis and improvement on an ID-based key issuing protocol'. Together they form a unique fingerprint.

Cite this