Presentation 1993/10/26
An Attack on an ID-Based Key Sharing System
Victor Luchangco, Kenji Koyama,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We present a collusion attack on the non-interactive ID-based key sharing(NIKS)scheme proposed by Tsujii,Araki,and Sekine.This attacking method is applicable to both the first(May 1993)and second(July 1993)versions of this scheme.The shared secret key of any two entities can be computed by solving a system of congruences modulo p-1,where p is a large prime used by the system. We also discuss methods to efficiently solve this system.The attack requires 3-5 colluders for the first version,and aL colluders for the second version,where L is a parameter of the system and a is some small constant,probably 1 【less than or equal 】 a 【less than or equal】 2.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Non-interactive ID-based key sharing
Paper # ISEC93-61
Date of Issue

Conference Information
Committee ISEC
Conference Date 1993/10/26(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) An Attack on an ID-Based Key Sharing System
Sub Title (in English)
Keyword(1) Non-interactive ID-based key sharing
1st Author's Name Victor Luchangco
1st Author's Affiliation NTT Communication Science Laboratories()
2nd Author's Name Kenji Koyama
2nd Author's Affiliation NTT Communication Science Laboratories
Date 1993/10/26
Paper # ISEC93-61
Volume (vol) vol.93
Number (no) 296
Page pp.pp.-
#Pages 10
Date of Issue