Cryptanalysis of two identification schemes based on an ID-based cryptosystem

被引:0
|
作者
Tang, Q [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
IEE PROCEEDINGS-COMMUNICATIONS | 2005年 / 152卷 / 05期
关键词
D O I
10.1049/ip-com:20050095
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two identification schemes based on the Maurer-Yacobi ID-based cryptosystem are analysed and shown to suffer from serious security problems.
引用
收藏
页码:723 / 724
页数:2
相关论文
共 50 条
  • [21] On the Linkability of Two Schnorr Type ID-based Blind Signature Schemes
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 265 - 269
  • [22] MODIFIED ID-BASED CRYPTOSYSTEM USING DISCRETE LOGARITHM PROBLEM
    LAIH, CS
    LEE, JY
    ELECTRONICS LETTERS, 1988, 24 (14) : 858 - 859
  • [23] Efficient ID-based blind signature schemes
    Ming, Yang
    Wang, Yumin
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 260 - 264
  • [24] Security on Dynamic ID-based Authentication Schemes
    Zhai, Jingxuan
    Cao, Tianjie
    Chen, Xiuqing
    Huang, Shi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 387 - 396
  • [25] Security enhancement in ad hoc network with ID-based cryptosystem
    Song, J
    Kim, H
    Lee, S
    Yoon, H
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 372 - 376
  • [26] A practical approach of ID-based cryptosystem in ad hoc networks
    Kim, Heeyoul
    Song, Jumin
    Yoon, Hyunsoo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2007, 7 (07): : 909 - 917
  • [27] ID-based digital signature scheme on the elliptic curve cryptosystem
    Chung, Yu Fang
    Huang, Kuo Hsuan
    Lai, Feipei
    Chen, Tzer Shyong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) : 601 - 604
  • [28] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [29] ID-BASED CRYPTOGRAPHIC SCHEMES FOR USER IDENTIFICATION, DIGITAL SIGNATURE, AND KEY DISTRIBUTION
    HARN, L
    YANG, SB
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 757 - 760
  • [30] ID-based cryptographic schemes based on factoring and discrete logarithms
    Su, PC
    Lu, EH
    Chang, HKC
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 556 - 563