IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Regular Section
Security Vulnerability of ID-Based Key Sharing Schemes
JungYeon HWANGTaek-Young YOUNWilly SUSILO
Author information
JOURNAL RESTRICTED ACCESS

2009 Volume E92.A Issue 10 Pages 2641-2643

Details
Abstract

Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key.

Content from these authors
© 2009 The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top