Cryptanalysis and Improvement on an Threshold Key Issuing Protocol
Zhang Bo,Xu Qiuliang,Liu Xin +2 more
- pp 729-732
TLDR
This work analyzes an threshold key issuing protocol due to Gangishetti et al. and shows that the protocol suffers from the attacks of the malicious KGC and the users can deny that they have never received the key.Abstract:
Key issuing protocols deal with overcoming the two inherent problems: key escrow and secure channel requirement of the identity based cryptosystems. An efficient and secure key issuing protocol enables the identity-based cryptosystems to be applicable in the real world. We analyze an threshold key issuing protocol due to Gangishetti et al. and show that the protocol suffers from the attacks of the malicious KGC and the users can deny that they have never received the key. Furthermore, we present an improved protocol, which is undeniable and secure against KGC's attacks.read more
References
More filters
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Journal Article
Efficient identity based signature schemes based on pairings
TL;DR: In this paper, an efficient identity based signature scheme based on pairings whose security relies on the hardness of the Diffie-Hellman problem in the random oracle model was proposed.
Journal ArticleDOI
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
TL;DR: This paper shows that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys, and presents a new protocol which proves to satisfy the security requirements from DKG protocols and ensures a uniform distribution of the generated keys.
Book ChapterDOI
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
TL;DR: This work investigates a number of issues related to the use of multiple trust authorities and multiple identities in the type of identifier based cryptography enabled by the Weil and Tate pairings and investigates how one can equate a trust authority with a way to add contextual information to an identity.