University of Wollongong
Browse

Security vulnerability of ID-based key sharing schemes

Download (1020.4 kB)
journal contribution
posted on 2024-11-15, 06:59 authored by Jung Yeon Hwang, Taek-Young Youn, Willy SusiloWilly Susilo
Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key.

History

Citation

Hwang, J., Youn, T. & Susilo, W. (2009). Security vulnerability of ID-based key sharing schemes. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, E92-A (10), 2641-2643.

Journal title

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

Volume

E92-A

Issue

10

Pagination

2641-2643

Language

English

RIS ID

31096

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC