Skip to main content
placeholder image

Security vulnerability of ID-based key sharing schemes

Journal Article


Abstract


  • Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key. Copyright © 2009 The Institute of Electronics, Information and Communication Engineers.

Publication Date


  • 2009

Citation


  • Hwang, J. Y., Youn, T. Y., & Susilo, W. (2009). Security vulnerability of ID-based key sharing schemes. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E92-A(10), 2641-2643. doi:10.1587/transfun.E92.A.2641

Scopus Eid


  • 2-s2.0-84883862581

Start Page


  • 2641

End Page


  • 2643

Volume


  • E92-A

Issue


  • 10

Abstract


  • Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key. Copyright © 2009 The Institute of Electronics, Information and Communication Engineers.

Publication Date


  • 2009

Citation


  • Hwang, J. Y., Youn, T. Y., & Susilo, W. (2009). Security vulnerability of ID-based key sharing schemes. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E92-A(10), 2641-2643. doi:10.1587/transfun.E92.A.2641

Scopus Eid


  • 2-s2.0-84883862581

Start Page


  • 2641

End Page


  • 2643

Volume


  • E92-A

Issue


  • 10