[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Regular Section
Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
Ik Rae JEONGJeong Ok KWONDong Hoon LEE
Author information
JOURNAL RESTRICTED ACCESS

2009 Volume E92.A Issue 3 Pages 932-934

Details
Abstract

In 2006, Tanaka has proposed an efficient variant of Maurer-Yacobi's identity-based non-interactive key sharing scheme. In Tanaka's scheme, the computational complexity to generate each user's secret information is much smaller than that of Maurer-Yacobi's scheme. Tanaka's original key sharing scheme does not provide completeness, and so Tanaka has corrected the original scheme to provide completeness. In this paper, we show that Tanaka's corrected key sharing scheme is not secure against collusion attacks. That is, two users can collaborate to factorize a system modulus with their secret information and thus break the key sharing scheme.

Content from these authors
© 2009 The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top