Presentation | 1993/10/26 An Attack on an ID-Based Key Sharing System Victor Luchangco, Kenji Koyama, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We present a collusion attack on the non-interactive ID-based key sharing(NIKS)scheme proposed by Tsujii,Araki,and Sekine.This attacking method is applicable to both the first(May 1993)and second(July 1993)versions of this scheme.The shared secret key of any two entities can be computed by solving a system of congruences modulo p-1,where p is a large prime used by the system. We also discuss methods to efficiently solve this system.The attack requires 3-5 colluders for the first version,and aL colluders for the second version,where L is a parameter of the system and a is some small constant,probably 1 【less than or equal 】 a 【less than or equal】 2. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Non-interactive ID-based key sharing |
Paper # | ISEC93-61 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1993/10/26(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | An Attack on an ID-Based Key Sharing System |
Sub Title (in English) | |
Keyword(1) | Non-interactive ID-based key sharing |
1st Author's Name | Victor Luchangco |
1st Author's Affiliation | NTT Communication Science Laboratories() |
2nd Author's Name | Kenji Koyama |
2nd Author's Affiliation | NTT Communication Science Laboratories |
Date | 1993/10/26 |
Paper # | ISEC93-61 |
Volume (vol) | vol.93 |
Number (no) | 296 |
Page | pp.pp.- |
#Pages | 10 |
Date of Issue |