Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key.
History
Citation
Hwang, J., Youn, T. & Susilo, W. (2009). Security vulnerability of ID-based key sharing schemes. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, E92-A (10), 2641-2643.
Journal title
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences