Presentation 1995/12/14
New attacks on non-interactive ID-based key sharing scheme of power operations and multiplications
Atsunori FUJIKAWA, Yasuyuki MURAKAMI, Masao KASAHARA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) It is widely recognized that on non-interactive ID-based key sharing scheme using power operations and multiplications, common key can be forged in collusion. But no definite method has been given so far. In this paper, we propose a definite attacking method by taking advantage of the properties of matrix. It can be simply described using proposed matrix operations.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) ID-based non-interactive key sharing scheme / determinant / Euclid's division algorithm
Paper # ISEC95-34
Date of Issue

Conference Information
Committee ISEC
Conference Date 1995/12/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) New attacks on non-interactive ID-based key sharing scheme of power operations and multiplications
Sub Title (in English)
Keyword(1) ID-based non-interactive key sharing scheme
Keyword(2) determinant
Keyword(3) Euclid's division algorithm
1st Author's Name Atsunori FUJIKAWA
1st Author's Affiliation Department of Information Science and Design, Kyoto Institute of Technology()
2nd Author's Name Yasuyuki MURAKAMI
2nd Author's Affiliation communication equipment div., MURATA MACHINERY, LTD.
3rd Author's Name Masao KASAHARA
3rd Author's Affiliation Department of Information Science and Design, Kyoto Institute of Technology
Date 1995/12/14
Paper # ISEC95-34
Volume (vol) vol.95
Number (no) 422
Page pp.pp.-
#Pages 9
Date of Issue