Cryptanalysis of two identification schemes based on an ID-based cryptosystem

被引:0
|
作者
Tang, Q [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
IEE PROCEEDINGS-COMMUNICATIONS | 2005年 / 152卷 / 05期
关键词
D O I
10.1049/ip-com:20050095
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two identification schemes based on the Maurer-Yacobi ID-based cryptosystem are analysed and shown to suffer from serious security problems.
引用
收藏
页码:723 / 724
页数:2
相关论文
共 50 条
  • [41] ATTACKS ON AN ID-BASED SIGNATURE SCHEME BASED ON RABIN PUBLIC-KEY CRYPTOSYSTEM
    KO, MY
    HWANG, T
    CHANG, CC
    COMPUTER COMMUNICATIONS, 1994, 17 (09) : 674 - 676
  • [42] Cryptanalysis of two ID based password authentication schemes for multi-server environments
    Tan Z.
    International Journal of Digital Content Technology and its Applications, 2011, 5 (01) : 87 - 94
  • [43] Cryptanalysis of a knapsack based two-lock cryptosystem
    Zhang, B
    Wu, HJ
    Feng, DG
    Bao, F
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 303 - 309
  • [44] On the security of Kim et al. two ID-based broadcast signcryption schemes
    Zhang, Jianhong
    Tang, Wenjing
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1509 - 1514
  • [45] An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Meshram, Sarita Gajbhiye
    Li, Chun-Ta
    SOFT COMPUTING, 2019, 23 (16) : 6937 - 6946
  • [46] An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
    Chandrashekhar Meshram
    Cheng-Chi Lee
    Sarita Gajbhiye Meshram
    Chun-Ta Li
    Soft Computing, 2019, 23 : 6937 - 6946
  • [47] Cryptanalysis of Two Identification Schemes
    Tan, Syh-Yuan
    Chin, Ji-Jian
    Behnia, Rouzbeh
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 33 - 36
  • [48] New ID-Based Blind Signature Schemes with Message Recovery
    Zheng, Yanbin
    Zhang, Yuting
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 2020 - 2023
  • [49] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    annals of telecommunications - annales des télécommunications, 2011, 66 : 657 - 662
  • [50] ID-based group-oriented cryptosystem and its digital signature scheme
    Wu, TC
    Su, RL
    COMPUTER COMMUNICATIONS, 1997, 20 (11) : 1019 - 1026