Cryptanalysis of two identification schemes based on an ID-based cryptosystem

被引:0
|
作者
Tang, Q [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
IEE PROCEEDINGS-COMMUNICATIONS | 2005年 / 152卷 / 05期
关键词
D O I
10.1049/ip-com:20050095
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two identification schemes based on the Maurer-Yacobi ID-based cryptosystem are analysed and shown to suffer from serious security problems.
引用
收藏
页码:723 / 724
页数:2
相关论文
共 50 条
  • [31] An ID-Based Public key Cryptosystem based on the Double Discrete Logarithm Problem
    Meshram, Chandrashekhar
    Agrawal, Shyam Sundar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (07): : 8 - 13
  • [32] New ID-based identification scheme
    Li, Yan-Ping
    Su, Wan-Li
    Wang, Yu-Min
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (01): : 86 - 90
  • [33] Known Signature Attack of ID-based Multisignature Schemes
    Yang, Wu-Chuan
    Jhou, Jhih-Syue
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 341 - +
  • [34] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
  • [35] ID-Based threshold signature and mediated signature schemes
    Yu, Yong
    Yang, Bo
    Sun, Ying
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 473 - +
  • [36] Security Vulnerability of ID-Based Key Sharing Schemes
    Hwang, JungYeon
    Youn, Taek-Young
    Susilo, Willy
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10): : 2641 - 2643
  • [37] A new hierarchical ID-based cryptosystem and CCA-secure PKE
    Li, Jin
    Zhang, Fangguo
    Wang, Yanming
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 362 - 371
  • [38] ID-based secure PIM-SM schemes
    Zhang, Junqi
    Varadharajan, Vijay
    Mu, Yi
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 190 - +
  • [39] Cryptanalysis of Lee and Chang's ID-based information security functions
    He, WH
    Wu, TC
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 723 - 726
  • [40] MODIFIED ID-BASED CRYPTOSYSTEM USING DISCRETE LOGARITHM PROBLEM - COMMENT
    TSUJII, S
    ITOH, T
    TANAKA, H
    ELECTRONICS LETTERS, 1989, 25 (01) : 77 - 78