Maurer-Yacobi ID-Based Key Distribution Revisited

نویسندگان

  • Noboru Kunihiro
  • Wataru Abe
  • Kazuo Ohta
چکیده

In 1984, Shamir first introduced the concept of ID-based cryptosystems [1]. Although various schemes have been proposed after his proposal, we may say that the only bilinear map based schemes [2], [3] are practical. In this letter, we examine the realizability of the other scheme: Maurer-Yacobi key distribution scheme [4]. In this scheme, a user’s private key is generated by solving Discrete Logarithm Problem (DLP). Boneh and Franklin criticize in [3] that this scheme “requires the Private Key Generator (PKG) to spend a long time for each private key generation request.” First, we show the requirement so that MaurerYacobi scheme is regarded as a practical scheme. Then, we propose an adequate parameter setting so as to meet the requirement. We evaluate the computational time for key generation under such parameter setting and describe that key generation is feasible in a practical time. Our results show that Maurer-Yacobi scheme is more practical than previously expected and can be practical in the near future under adequate parameter setting and correct usage.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Murakami-Kasahara ID-based Key Sharing Scheme Revisited - In Comparison with Maurer-Yacobi Schemes -

In Sept. 1990, the present authors firstly discussed DLP over composite number and presented an ID-based Key Sharing Scheme referred to as MK1. In 1991, Maurer and Yacobi presented a scheme, referred to as MY, which is similar to our scheme, MK1. Unfortunately the schemes MK1 and MY are not secure. In Dec. 1990, the present authors presented a secure ID-based key sharing scheme referred to as M...

متن کامل

Cryptanalysis of two identification schemes based on an ID-based cryptosystem

Two identification schemes based on the Maurer-Yacobi ID-based cryptosystem are analysed and shown to suffer from serious security problems.

متن کامل

Modiied Maurer-yacobi's Scheme and Its Applications

In Eurocrypt'91, Maurer and Yacobi developed a method for building a trapdoor into the one-way function of exponentiation modulo a composite number which enables an identity-based non-interactive key distribution system. In this paper, we provide some improvements of their scheme and then present a modiied trapdoor one-way function by combining Maurer-Yacobi's scheme and RSA scheme. We demonstr...

متن کامل

Security of Improved Identity-Based Conference Key Distribution Systems

At Crypto-87 conference, we proposed identity-based key distribution systems for generating a common secret conference key for two or more users. Protocols were shown for three configurations: a ring, a complete graph, and a star. Yacobi has made an impersonation attack on the protocols for the complete graph and star networks. This paper proposes improved identity-based key distribution protoc...

متن کامل

QUICKSELECT Revisited

We give an overview of the running time analysis of the random divide-and-conquer algorithm FIND or QUICKSELECT. The results concern moments, distribution of FIND’s running time, the limiting distribution, a stochastic bound and the key: a stochastic fixed point equation.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEICE Transactions

دوره 89-A  شماره 

صفحات  -

تاریخ انتشار 2006