DocumentCode
3372298
Title
Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol
Author
Wang, Licheng ; Cao, Zhenfu ; Cao, Feng ; Qian, Haifeng
Author_Institution
Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ.
Volume
2
fYear
2006
fDate
20-24 June 2006
Firstpage
8
Lastpage
12
Abstract
In this paper we analyze an ID-based key issuing protocol due to Gangishetti et al., designed for eliminating the need of secure channel between PKG and users and avoiding the key escrow problem. Their protocol consists of five sub-protocols, namely system setup, system public key setup, key issuing, key securing and key retrieving. We show that both the key issuing and the key securing sub-protocols suffer from impersonation attacks. Further, we present an improved key issuing protocol which is proved to be secure against adaptive chosen message attack in the random oracle model under the CDH assumption
Keywords
digital signatures; message switching; protocols; public key cryptography; telecommunication channels; telecommunication security; ID-based key issuing protocol; cryptanalysis; impersonation attack; key escrow problem; key issuing protocol; key retrieving protocol; key securing protocol; message attack; random oracle model; secure channel; system public key setup protocol; system setup protocol; Computational efficiency; Computer science; Cryptographic protocols; Design engineering; Distributed computing; Elliptic curve cryptography; Identity-based encryption; Public key; Public key cryptography; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer and Computational Sciences, 2006. IMSCCS '06. First International Multi-Symposiums on
Conference_Location
Hanzhou, Zhejiang
Print_ISBN
0-7695-2581-4
Type
conf
DOI
10.1109/IMSCCS.2006.205
Filename
4673669
Link To Document