Presentation | 1998/7/31 ID-NIKS Based on RSA Cryptosystem Is Not Secure TOSHIYA ITOH, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Identity-based noninteractive key-sharing schemes (ID-NIKS) are practical crypto-graphic tools to make key management tasks easier in large-scale networks. Several ID-NIKS's have been proposed so far, but most of them are proved to be insecure when sufficiently many entities conspire. Recently, Murakami, Fujikawa, and Kasahara presented a new ID-NIKS based on the RSA cryptosystem and mentioned that it is secure even when sufficiently many entities conspire. The ID-NIKS looks secure, but its security analysis only deals with several potential attacks and would be logically insufficient. In this paper, we analyze the security of the scheme and show that (1) any single entity can factor the public modulus ; (2) if three entities conspire, they can impersonate a specific entity ; (3) if n entities conspire, they can impersonate any other entity ; and (4) if n entities conspire, they can derive the trusted center's secret-key that might be different from but is equivalent to the original secret-key of the trusted center. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | ID-Based Noninteractive Key Sharing / RSA / Factorization / Conspiracy |
Paper # | ISEC98-20 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1998/7/31(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | ID-NIKS Based on RSA Cryptosystem Is Not Secure |
Sub Title (in English) | |
Keyword(1) | ID-Based Noninteractive Key Sharing |
Keyword(2) | RSA |
Keyword(3) | Factorization |
Keyword(4) | Conspiracy |
1st Author's Name | TOSHIYA ITOH |
1st Author's Affiliation | Department of Information Processing Interdisciplinary Graduate School of Science and Engineering Tokyo Institute of Technology() |
Date | 1998/7/31 |
Paper # | ISEC98-20 |
Volume (vol) | vol.98 |
Number (no) | 228 |
Page | pp.pp.- |
#Pages | 10 |
Date of Issue |