scispace - formally typeset
Open AccessProceedings ArticleDOI

Cryptanalysis and Improvement on an Threshold Key Issuing Protocol

Zhang Bo, +2 more
- pp 729-732
TLDR
This work analyzes an threshold key issuing protocol due to Gangishetti et al. and shows that the protocol suffers from the attacks of the malicious KGC and the users can deny that they have never received the key.
Abstract
Key issuing protocols deal with overcoming the two inherent problems: key escrow and secure channel requirement of the identity based cryptosystems. An efficient and secure key issuing protocol enables the identity-based cryptosystems to be applicable in the real world. We analyze an threshold key issuing protocol due to Gangishetti et al. and show that the protocol suffers from the attacks of the malicious KGC and the users can deny that they have never received the key. Furthermore, we present an improved protocol, which is undeniable and secure against KGC's attacks.

read more

References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Journal Article

Efficient identity based signature schemes based on pairings

TL;DR: In this paper, an efficient identity based signature scheme based on pairings whose security relies on the hardness of the Diffie-Hellman problem in the random oracle model was proposed.
Journal ArticleDOI

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems

TL;DR: This paper shows that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys, and presents a new protocol which proves to satisfy the security requirements from DKG protocols and ensures a uniform distribution of the generated keys.
Book ChapterDOI

Applications of Multiple Trust Authorities in Pairing Based Cryptosystems

TL;DR: This work investigates a number of issues related to the use of multiple trust authorities and multiple identities in the type of identifier based cryptography enabled by the Weil and Tate pairings and investigates how one can equate a trust authority with a way to add contextual information to an identity.
Related Papers (5)