Presentation 1999/11/8
Notes on ID-Based Non-Interactive Key Sharing Schemes
Yasuyuki MURAKAMI, Masao KASAHARA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) ID-based non interactive key sharing scheme is one of the excellent solutions for the secret key managements, because the scheme can generate a common key with only a set of secret data given from a center and the public data of the ID information of a receiver. In this paper, first, we present a new attack for product-sum type probabilistic ID-NIKS which is proposed by Murakami and Kasahara in SCIS'99. Second, we present a new attack for ID-NIKS based on double exponential function. Moreover, we show that ID-NIKS based on double exponential function is practically secure.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) key sharing / ID-NIKS / collusion attack / FMK attack
Paper # ISEC99-54
Date of Issue

Conference Information
Committee ISEC
Conference Date 1999/11/8(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Notes on ID-Based Non-Interactive Key Sharing Schemes
Sub Title (in English)
Keyword(1) key sharing
Keyword(2) ID-NIKS
Keyword(3) collusion attack
Keyword(4) FMK attack
1st Author's Name Yasuyuki MURAKAMI
1st Author's Affiliation Department of Electronics and Information Science, Kyoto Institute of Technology()
2nd Author's Name Masao KASAHARA
2nd Author's Affiliation Department of Electronics and Information Science, Kyoto Institute of Technology
Date 1999/11/8
Paper # ISEC99-54
Volume (vol) vol.99
Number (no) 414
Page pp.pp.-
#Pages 6
Date of Issue