Skip to main content
placeholder image

Security vulnerability of ID-based key sharing schemes

Journal Article


Download full-text (Open Access)

Abstract


  • Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key.

UOW Authors


  •   Hwang, Jung Yeon (external author)
  •   Ypun, Taek-Young (external author)
  •   Susilo, Willy

Publication Date


  • 2009

Citation


  • Hwang, J., Youn, T. & Susilo, W. (2009). Security vulnerability of ID-based key sharing schemes. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, E92-A (10), 2641-2643.

Scopus Eid


  • 2-s2.0-84883862581

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=3499&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/2490

Number Of Pages


  • 2

Start Page


  • 2641

End Page


  • 2643

Volume


  • E92-A

Issue


  • 10

Abstract


  • Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key.

UOW Authors


  •   Hwang, Jung Yeon (external author)
  •   Ypun, Taek-Young (external author)
  •   Susilo, Willy

Publication Date


  • 2009

Citation


  • Hwang, J., Youn, T. & Susilo, W. (2009). Security vulnerability of ID-based key sharing schemes. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, E92-A (10), 2641-2643.

Scopus Eid


  • 2-s2.0-84883862581

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=3499&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/2490

Number Of Pages


  • 2

Start Page


  • 2641

End Page


  • 2643

Volume


  • E92-A

Issue


  • 10