The Community for Technology Leaders
RSS Icon
Subscribe
Hanzhou, Zhejiang
June 20, 2006 to June 24, 2006
ISBN: 0-7695-2581-4
pp: 8-12
Licheng Wang , Shanghai Jiao Tong University, China
Zhenfu Cao , Shanghai Jiao Tong University, China
Feng Cao , Shanghai Jiao Tong University, China
Haifeng Qian , Shanghai Jiao Tong University, China
ABSTRACT
In this paper we analyze an ID-based key issuing protocol due to Gangishetti et al., designed for eliminating the need of secure channel between PKG and users and avoiding the key escrow problem. Their protocol consists of five sub-protocols, namely System Setup, System Public Key Setup, Key Issuing, Key Securing and Key Retrieving. We show that both the Key Issuing and the Key Securing subprotocols suffer from impersonation attacks. Further, we present an improved key issuing protocol which is proved to be secure against adaptive chosen message attack in the random oracle model under the CDH assumption.
INDEX TERMS
null
CITATION
Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian, "Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol", IMSCCS, 2006, First International on Computer and Computational Sciences, First International on Computer and Computational Sciences 2006, pp. 8-12, doi:10.1109/IMSCCS.2006.205
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool