Cryptanalysis of two identification schemes based on an ID-based cryptosystem

Chris J. Mitchell and Tang, Q.

(2005)

Chris J. Mitchell and Tang, Q. (2005) Cryptanalysis of two identification schemes based on an ID-based cryptosystem. IEE Proceedings on Communications, 152 (5).

Our Full Text Deposits

Full text access: Open

Full Text - 91.68 KB

Links to Copies of this Item Held Elsewhere


Abstract

Two identification schemes based on the Maurer-Yacobi ID-based cryptosystem are analysed and shown to suffer from serious security problems.

Information about this Version

This is a Published version
This version's date is: 10/2005
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/fdc80122-6883-6002-baec-f46afbc213be/1/

Item TypeJournal Article
TitleCryptanalysis of two identification schemes based on an ID-based cryptosystem
AuthorsMitchell, Chris
Tang, Q.
Uncontrolled Keywordscryptosystem, security, Maurer-Yacobi ID
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1049/ip-com:20050095

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

This is the final draft version of the paper that appeared in the journal 'IEE Proceedings on Communications', 152(5) 2005.


Details