The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Récemment, plusieurs schémas de partage de clés basés sur l'identification ont été proposés, dans lesquels une phase d'initiation génère la clé secrète des utilisateurs associée aux identités sous la dureté de la factorisation entière. Dans cette lettre, nous montrons que, malheureusement, tout système de partage de clés avec cette phase d'initiation est intrinsèquement non sécurisé dans le sens où la collusion de certains utilisateurs leur permet de dériver des clés privées principales et donc de générer la clé secrète de n'importe quel utilisateur.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
JungYeon HWANG, Taek-Young YOUN, Willy SUSILO, "Security Vulnerability of ID-Based Key Sharing Schemes" in IEICE TRANSACTIONS on Fundamentals,
vol. E92-A, no. 10, pp. 2641-2643, October 2009, doi: 10.1587/transfun.E92.A.2641.
Abstract: Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E92.A.2641/_p
Copier
@ARTICLE{e92-a_10_2641,
author={JungYeon HWANG, Taek-Young YOUN, Willy SUSILO, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Security Vulnerability of ID-Based Key Sharing Schemes},
year={2009},
volume={E92-A},
number={10},
pages={2641-2643},
abstract={Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key.},
keywords={},
doi={10.1587/transfun.E92.A.2641},
ISSN={1745-1337},
month={October},}
Copier
TY - JOUR
TI - Security Vulnerability of ID-Based Key Sharing Schemes
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2641
EP - 2643
AU - JungYeon HWANG
AU - Taek-Young YOUN
AU - Willy SUSILO
PY - 2009
DO - 10.1587/transfun.E92.A.2641
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E92-A
IS - 10
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - October 2009
AB - Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key.
ER -