On Chikazawa-Inoue ID based key system
نویسندگان
چکیده
In this paper, we show that Chikazawa-Inoue ID-based key system is insecure by collusion, where Chikazawa-Inoue ID-based key system means the key parameters established during the initiation phase. We describe an algorithm factorizing a public key of Trust Center. Since our attack is based on only the key system and has no relation with specific key sharing protocols, it can be applied to all variant protocols of Chikazawa-Inoue ID based key sharing protocol. From this analysis, we obtain conclusions that ChikazawaInoue ID-based key system cannot be used any more for any application protocols, which means that our result puts an end to discussion of related key sharing protocols.
منابع مشابه
A Fully Secure Revocable ID-Based Encryption in the Standard Model
Revocation problem is a critical issue for key management of public key systems. Any certificate-based or identity (ID)-based public key systems must provide a revocation method to revoke misbehaving/compromised users from the public key systems. In the past, there was little work on studying the revocation problem of ID-based public key systems. Most recently, Tseng and Tsai presented a novel ...
متن کاملA Study on Security Management Architecture for Personal Networks
The authors have studied the security management architecture for Personal Networks (PN). The main feature of the proposed architecture is to exploit a trusted cellular system, namely, an IMS (IP Multimedia Subsystem), to provide security functions for PNs over open networks like the Internet. They also proposed two security functions to solve security issues for a PN, PE ID and Key Assignment ...
متن کاملar X iv : 0 90 9 . 13 88 v 1 [ cs . C R ] 8 S ep 2 00 9 On the Relations Between Diffie - Hellman and ID - Based Key Agreement from Pairings ∗
This paper studies the relationships between the traditional Diffie-Hellman key agreement protocol and the identity-based (ID-based) key agreement protocol from pairings. For the Sakai-Ohgishi-Kasahara (SOK) ID-based key construction, we show that identical to the Diffie-Hellman protocol, the SOK key agreement protocol also has three variants, namely ephemeral, semi-static and static versions. ...
متن کاملCost-effective Product Traceability System Based on Widely Distributed Databases
A cost-effective and easy way of introducing a product traceability system is to start from a small system and gradually extend it to a large-scale system. Traceability systems used in previous field tests are unsuitable for largescale deployment because they use a single, centralized database. This paper describes an extendable traceability system proposed by Toshiba that employs distributed d...
متن کاملCryptanalysis of the Sakazaki-Okamoto-Mambo ID-based Key Distribution System over Elliptic Curves
In 1997, H. Sakazaki, E. Okamato and M. Mambo [4] proposed an ID-based key distribution system on an elliptic curve over Zn. We will cryptanalyze the scheme and demonstrate that when the hashed ID length is about 160 bits, the scheme is insecure. To be specific, after requesting a small number of keys from the Center, our attack allows a new valid key to be constructed without any further inter...
متن کامل