Presentation 1999/5/20
Notes on Security of ProbabilistiC IDNIKS
Ryuuichi SAKAI, Yasuyuki Murakami, Masao KASAHARA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) ID-based non interactive key sharing schemes are good solutions of the secret key managements, because the scheme can generate a common key with only a set of date recieved from a center and the ID information of a receiver. This paper presents some new collusion attacks with LLL algorithm for the probabilistic ID-NIKS. The ID-NIKS are developed for higher security against the collusion attacks. Moreover the paper discusses its efficiencies and security of the probabilistic ID-NIKS.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) key sharing / ID-NIKS / LLL algorithm / collusion attack / amount of calculatidn
Paper # ISEC99-4
Date of Issue

Conference Information
Committee ISEC
Conference Date 1999/5/20(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Notes on Security of ProbabilistiC IDNIKS
Sub Title (in English)
Keyword(1) key sharing
Keyword(2) ID-NIKS
Keyword(3) LLL algorithm
Keyword(4) collusion attack
Keyword(5) amount of calculatidn
1st Author's Name Ryuuichi SAKAI
1st Author's Affiliation Department of LightWave Sciences, Osaka Electro-Communication University()
2nd Author's Name Yasuyuki Murakami
2nd Author's Affiliation Department of Information Science and Design, Kyoto Institute of Technology
3rd Author's Name Masao KASAHARA
3rd Author's Affiliation Department of Information Science and Design, Kyoto Institute of Technology
Date 1999/5/20
Paper # ISEC99-4
Volume (vol) vol.99
Number (no) 57
Page pp.pp.-
#Pages 6
Date of Issue