A new probabilistic ID-based non-interactive key sharing scheme

被引:0
|
作者
Murakami, Y [1 ]
Sakai, R
Kasahara, M
机构
[1] Kyoto Inst Technol, Dept Elect & Informat Sci, Kyoto 6068585, Japan
[2] Osaka Electrocommun Univ, Dept Lightwave Sci, Neyagawa, Osaka 5728530, Japan
关键词
ID; key sharing; non-interactive; ID-based noninteractive key sharing scheme (ID-NIKS); linear attack; collusion attack;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new probabilistic ID-based noninteractive key sharing scheme that has non-separable secret-key functions and a non-separable common-key function. The proposed scheme uses the calculation over modulo-P, modulo-Q and over integer ring for realizing non-separability, This proposed scheme has a large threshold against linear attack by the collusive entities.
引用
收藏
页码:2 / 9
页数:8
相关论文
共 50 条
  • [1] Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
    Jeong, Ik Rae
    Kwon, Jeong Ok
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (03): : 932 - 934
  • [2] Collusion-attack free ID-based non-interactive key sharing
    Tanaka, Hatsukazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (06) : 1820 - 1824
  • [3] A SIMPLE ID-BASED SCHEME FOR KEY SHARING
    TSUJII, S
    CHAO, JH
    ARAKI, K
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 730 - 734
  • [4] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [5] An ID-based non-interactive tripartite key agreement protocol with K-resilience
    Tso, R
    Okamoto, T
    Takagi, T
    Okamoto, E
    PROCEEDINGS OF THE THIRD IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND COMPUTER NETWORKS, 2005, : 38 - 42
  • [6] Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
    Koo, Woo Kwon
    Hwang, Jung Yeon
    Lee, Dong Hoon
    INFORMATION PROCESSING LETTERS, 2009, 109 (23-24) : 1260 - 1262
  • [7] A NEW ID-BASED KEY SHARING SYSTEM
    TSUJII, S
    CHAO, JH
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 288 - 299
  • [8] ID-based cryptographic schemes using a non-interactive public-key distribution system
    Tseng, YM
    Jan, JK
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 237 - 243
  • [9] A new digital signature scheme on ID-based key-sharing infrastructures
    Nishioka, T
    Hanaoka, G
    Imai, H
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 259 - 270
  • [10] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080