Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, Ik Rae-
dc.contributor.authorKwon, Jeong Ok-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-08T19:24:59Z-
dc.date.available2021-09-08T19:24:59Z-
dc.date.created2021-06-10-
dc.date.issued2009-03-
dc.identifier.issn1745-1337-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/120507-
dc.description.abstractIn 2006, Tanaka has proposed an ellicient variant of Maurer-Yacobi's identity-based non-interactive key sharing scheme. In Tanaka's scheme, the computational complexity to generate each user's secret information is much smaller than that of Maurer-Yacobi's scheme. Tanaka's original key sharing scheme does not provide completeness, and so Tanaka has corrected the original scheme to provide completeness. In this paper, we show that Tanaka's corrected key sharing scheme is not secure against collusion attacks. That is two users can collaborate to factorize a system modulus with their secret information and thus break the key sharing scheme.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleCollusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1587/transfun.E92.A.932-
dc.identifier.scopusid2-s2.0-77956071399-
dc.identifier.wosid000265630900031-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E92A, no.3, pp.932 - 934-
dc.relation.isPartOfIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE92A-
dc.citation.number3-
dc.citation.startPage932-
dc.citation.endPage934-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthornon-interactive key sharing-
dc.subject.keywordAuthoridentity-based cryptosystem-
dc.subject.keywordAuthorcollusion attacks-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE