Tang, Qiang and Mitchell, Chris J (2005) Cryptanalysis of two identification schemes based on an ID-based cryptosystem. IEE Proceedings on Communications, 152 (5).
Full text access: Open
Two identification schemes based on the Maurer-Yacobi ID-based cryptosystem are analysed and shown to suffer from serious security problems.
This is a Submitted version This version's date is: 10/2005 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/fdc80122-6883-6002-baec-f46afbc213be/2/
Deposited by Research Information System (atira) on 24-May-2012 in Royal Holloway Research Online.Last modified on 24-May-2012