Improvement on Sui et al.'s Separable and Anonymous Key Issuing Protocol in ID-based Cryptosystem

نویسندگان

  • Changji Wang
  • Qin Li
  • Xingfeng Yang
چکیده

To avoid the need of secure channel in ID-based public key systems (ID-PKC), Sui et al. proposed a separable and anonymous key issuing protocol in [1]. Recently, R. Gangishetti et al. showed that Sui et al.'s key issuing protocol suffers from the stolen verifier attack and incompetency of KGCs in [2]. However, R.Gangishetti et al. did not give any solutions to resist these attacks. In this paper, we improve Sui et al.'s separable and anonymous key issuing protocol, the improved protocol can resist the stolen verifier attack and remove the incompetency of KGCs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow

Recently, Sui et al. proposed two separable and anonymous IDbased key issuing protocols without secure channel and claimed that their second protocol avoids the key escrow problem. However, in this paper, impersonation attack is proposed to show that Sui et al.’s second protocol is not free from the key escrow problem. We also show that their protocol cannot detect the able to access of illegit...

متن کامل

Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems

To remove key escrow problem and avoid the need of secure channel in ID based cryptosystem Lee et al.[1] proposed a secure key issuing protocol. However we show that it suffers from impersonation, insider attacks and incompetency of the key privacy authorities. We also cryptanalyze Sui et al.’s[2] separable and anonymous key issuing protocol. 1 Review of Lee et al.’s Protocol [1] It includes fi...

متن کامل

Secure Key Issuing in ID-based Cryptography

ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent drawback of key escrow problem, i.e. users’ private keys are known to the key generation center (KGC). Therefore secure key issuing (SKI) is an important issue in ID-based cryptography. In multiple authority approach (Boneh & Franklin 2001, Chen et al. 2002), key generati...

متن کامل

An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et a...

متن کامل

Improving Choi et al.’s ID-based Authenticated Group Key Agreement Scheme at PKC2004

In modern network computing, authenticated group key agreement (AGKA) is important for conferencing. After Shamir [2] proposed the ID-based cryptosystem in 1984, the various applications on the ID-based cryptosystem have been actively studied, due to the simple key management complexity. For the AGKA, Choi et al. [16] proposed an ID-based authenticated group key agreement with bilinear maps, wh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006