• DocumentCode
    3372298
  • Title

    Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol

  • Author

    Wang, Licheng ; Cao, Zhenfu ; Cao, Feng ; Qian, Haifeng

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ.
  • Volume
    2
  • fYear
    2006
  • fDate
    20-24 June 2006
  • Firstpage
    8
  • Lastpage
    12
  • Abstract
    In this paper we analyze an ID-based key issuing protocol due to Gangishetti et al., designed for eliminating the need of secure channel between PKG and users and avoiding the key escrow problem. Their protocol consists of five sub-protocols, namely system setup, system public key setup, key issuing, key securing and key retrieving. We show that both the key issuing and the key securing sub-protocols suffer from impersonation attacks. Further, we present an improved key issuing protocol which is proved to be secure against adaptive chosen message attack in the random oracle model under the CDH assumption
  • Keywords
    digital signatures; message switching; protocols; public key cryptography; telecommunication channels; telecommunication security; ID-based key issuing protocol; cryptanalysis; impersonation attack; key escrow problem; key issuing protocol; key retrieving protocol; key securing protocol; message attack; random oracle model; secure channel; system public key setup protocol; system setup protocol; Computational efficiency; Computer science; Cryptographic protocols; Design engineering; Distributed computing; Elliptic curve cryptography; Identity-based encryption; Public key; Public key cryptography; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer and Computational Sciences, 2006. IMSCCS '06. First International Multi-Symposiums on
  • Conference_Location
    Hanzhou, Zhejiang
  • Print_ISBN
    0-7695-2581-4
  • Type

    conf

  • DOI
    10.1109/IMSCCS.2006.205
  • Filename
    4673669