Pitfalls in identity based encryption using an elliptic curve combined public key

Research output: Contribution to journalArticlepeer-review

Abstract

Recently, Zhang et al. proposed two encryption schemes using an elliptic curve combined public key. We show, via the trick of using a linear equation system, that both proposals are vulnerable to key recovery attack, and thus in the present form must be considered as insecure. We simulate our trick on a common personal laptop and always get the results at a sub-second level.

Original languageEnglish
Pages (from-to)1111-1113
Number of pages3
JournalApplied Mathematics Letters
Volume25
Issue number8
DOIs
StatePublished - Aug 2012

Keywords

  • Combined public key
  • Key privacy
  • Public key encryption

Fingerprint

Dive into the research topics of 'Pitfalls in identity based encryption using an elliptic curve combined public key'. Together they form a unique fingerprint.

Cite this