Abstract
At Crypto-87 conference, we proposed identity-based key distribution systems for generating a common secret conference key for two or more users. Protocols were shown for three configurations: a ring, a complete graph, and a star. Yacobi has made an impersonation attack on the protocols for the complete graph and star networks. This paper proposes improved identity-based key distribution protocols to counter his attack.
Chapter PDF
Similar content being viewed by others
References
SHAMIR, A.: “Identity-based cryptosystems and signature schemes”, Proceedings of Crypto’84, Lecture Notes in Computer Science no. 196, Springer-Verlag, 1985, pp.47–53.
FIAT, A. and SHAMIR, A.: “How to prove yourself: Practical solutions to identification and signature problems”, Proceedings of Crypto’86, Lecture Notes in Computer Science no. 263, Springer-Verlag, 1987, pp.186–194.
OKAMOTO, E.: “Proposal for identity-based key distribution systems”, Electron. Lett., 1986, 22, pp.1283–1284.
DIFFIE, W., and HELLMAN, M. E.: “New directions in cryptography”, IEEE Trans. 1976, IT-22, pp.644–654.
INGEMARSSON, I, TANG, D. T. and WONG, C. K.: “A conference key distribution system”, IEEE Trans. 1982, IT-28, pp.714–720.
KOYAMA, K. and OHTA, K.: “Identity-based conference key distribution systems”, Proceedings of Crypto’87, Lecture Notes in Computer Science no. 293, Springer-Verlag, 1988, pp.175–184.
YACOBI, Y.: “Attack on the Koyama-Ohta identity-based key distribution scheme”, Proceedings of Crypto’87, (presented at the rump session), Lecture Notes in Computer Science no. 293, Springer-Verlag, 1988, pp.429–433.
RIVEST, R. L., SHAMIR, A., and ADLEMAN, L.: “A method for obtaining digital signatures and public-key cryptosystems”, Commun. ACM, 1978, 21, pp.120–126.
LENSTRA, Jr. H. W.: “Factoring integers with elliptic curves”, preprint, May 1986
COPPERSMITH, D., ODLYZKO, A. M. and SCHROEPPEL, R.: “Discrete logarithms in GF(p)” Algorithmica 1986, 1, pp.1–15.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Koyama, K., Ohta, K. (1988). Security of Improved Identity-based Conference Key Distribution Systems. In: Barstow, D., et al. Advances in Cryptology — EUROCRYPT ’88. EUROCRYPT 1988. Lecture Notes in Computer Science, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45961-8_2
Download citation
DOI: https://doi.org/10.1007/3-540-45961-8_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-50251-7
Online ISBN: 978-3-540-45961-3
eBook Packages: Springer Book Archive