Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Stronger Chikazawa-Yamagishi ID-Based Key Distribution

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, Ik Rae-
dc.contributor.authorKwon, Jeong Ok-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-08T17:29:16Z-
dc.date.available2021-09-08T17:29:16Z-
dc.date.created2021-06-10-
dc.date.issued2009-05-
dc.identifier.issn0916-8508-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/120103-
dc.description.abstractThe Chikazawa-Yamagishi scheme is an ID-based key distribution scheme which is based on the RSA cryptosystem. There are several variant schemes to improve the efficiency and the security of the Chikazawa-Yamagishi scheme. Unfortunately, all of the proposed schemes have some weaknesses. First, all the proposed schemes require time synchronization of the communicating parties. Second, none of the proposed schemes provide both forward secrecy and security against session state reveal attacks. In this paper, we suggest an ID-based key distribution scheme which does not require time synchronization and provides both forward secrecy and security against session state reveal attacks.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectSECRECY-
dc.titleStronger Chikazawa-Yamagishi ID-Based Key Distribution-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1587/transfun.E92.A.1379-
dc.identifier.scopusid2-s2.0-77956023924-
dc.identifier.wosid000266425600018-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E92A, no.5, pp.1379 - 1382-
dc.relation.isPartOfIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE92A-
dc.citation.number5-
dc.citation.startPage1379-
dc.citation.endPage1382-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusSECRECY-
dc.subject.keywordAuthorkey distribution-
dc.subject.keywordAuthorID-based-
dc.subject.keywordAuthorforward secrecy-
dc.subject.keywordAuthorsession state reveal-
dc.subject.keywordAuthortime synchronization-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE