Presentation | 2000/1/26 On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks Seungjoo Kim, Masahiro Mambo, Hiroki Shizuya, Dongho Won, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | As far as the knowledge of authors, the rigorous security of Okamoto-Tanaka idenntity-based key exchange scheme was shown in [MS99] for the first time since its invention. However, the analysis deals with only the passive attack. In this paper, we describe several models of active attacks against the scheme and show the rigorous security of the scheme in these models. We prove several relationships including that (1) breaking the scheme in one attack model is equivalent to breaking the RSA public-key cryptosystem and (2) breaking the scheme in another attack model is equivalent to breaking the Diffie-Hellman key exchange scheme over Z_n. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Okamoto-Tanaka key exchange scheme / ID-based scheme / Active attack / Known-key attack / Forward secrecy / Oracle |
Paper # | ISEC99-99 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2000/1/26(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks |
Sub Title (in English) | |
Keyword(1) | Okamoto-Tanaka key exchange scheme |
Keyword(2) | ID-based scheme |
Keyword(3) | Active attack |
Keyword(4) | Known-key attack |
Keyword(5) | Forward secrecy |
Keyword(6) | Oracle |
1st Author's Name | Seungjoo Kim |
1st Author's Affiliation | Korea Information Security Agency() |
2nd Author's Name | Masahiro Mambo |
2nd Author's Affiliation | Education Center for Information Processing & Graduate School of Information Sciences Tohoku University |
3rd Author's Name | Hiroki Shizuya |
3rd Author's Affiliation | Education Center for Information Processing & Graduate School of Information Sciences Tohoku University |
4th Author's Name | Dongho Won |
4th Author's Affiliation | Dept.of Information Eng., Sungkyunkwan University |
Date | 2000/1/26 |
Paper # | ISEC99-99 |
Volume (vol) | vol.99 |
Number (no) | 585 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |