Chris J. Mitchell and Tang, Q. (2005) Cryptanalysis of two identification schemes based on an ID-based cryptosystem. IEE Proceedings on Communications, 152 (5).
Full text access: Open
Two identification schemes based on the Maurer-Yacobi ID-based cryptosystem are analysed and shown to suffer from serious security problems.
This is a Published version This version's date is: 10/2005 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/fdc80122-6883-6002-baec-f46afbc213be/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010
This is the final draft version of the paper that appeared in the journal 'IEE Proceedings on Communications', 152(5) 2005.