Advertisement

Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography

  • Saeran Kwon
  • Sang-Ho Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4083)

Abstract

In this paper, we analyze some serious weakness for security of existing key issuing schemes in identity(ID)-based cryptosystems which were proposed in order to eliminate key escrow property and remove the need of secure channel, and describe some attacks for them. In addition, we present the improved key issuing protocols for each scheme with weakness, which can resist the attack and overcome key escrow problem.

Keywords

Signature Scheme Valid Period Secure Channel Trust Authority Blinding Factor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Al-Riyami, S., Paterson, K.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Chen, L., Harrison, K., Soldera, D., Smart, N.P.: Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 260–275. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Gangishetti, R., Gorantla, M.C., Das, M.L.: An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystem. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005). IEEE Computer Society, Los Alamitos (2005)Google Scholar
  6. 6.
    Gentry, C.: Certificate-Based Encryption and the Certificate Revocation Problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Girault, M.: Self-Certified Public Keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)Google Scholar
  8. 8.
    Hess, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Secure Key Issuing in ID-based Cryptography. In: Proc. of AISW 2004, vol. 32, pp. 69–74 (2004)Google Scholar
  10. 10.
    Okamoto, T., Pointcheval, D.: The gap-problems: a new class of problems for the security of cryptographic schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104–118. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Saeran Kwon
    • 1
  • Sang-Ho Lee
    • 1
  1. 1.Dept. of Computer Science and EngineeringEwha Womans UniversitySeoulKorea

Personalised recommendations