Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeong, Ik Rae | - |
dc.contributor.author | Kwon, Jeong Ok | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-08T19:24:59Z | - |
dc.date.available | 2021-09-08T19:24:59Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2009-03 | - |
dc.identifier.issn | 1745-1337 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/120507 | - |
dc.description.abstract | In 2006, Tanaka has proposed an ellicient variant of Maurer-Yacobi's identity-based non-interactive key sharing scheme. In Tanaka's scheme, the computational complexity to generate each user's secret information is much smaller than that of Maurer-Yacobi's scheme. Tanaka's original key sharing scheme does not provide completeness, and so Tanaka has corrected the original scheme to provide completeness. In this paper, we show that Tanaka's corrected key sharing scheme is not secure against collusion attacks. That is two users can collaborate to factorize a system modulus with their secret information and thus break the key sharing scheme. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jeong, Ik Rae | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1587/transfun.E92.A.932 | - |
dc.identifier.scopusid | 2-s2.0-77956071399 | - |
dc.identifier.wosid | 000265630900031 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E92A, no.3, pp.932 - 934 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.title | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.volume | E92A | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 932 | - |
dc.citation.endPage | 934 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | non-interactive key sharing | - |
dc.subject.keywordAuthor | identity-based cryptosystem | - |
dc.subject.keywordAuthor | collusion attacks | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.