Paper Abstract and Keywords |
Presentation |
2005-07-22 09:55
Murakami-Kasahara ID-based Key Sharing Scheme Revisited
-- In Comparison With Maurer-Yacobi Scheme -- Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
In Sept.~1990, the present authors firstly discussed DLP over
composite number and presented an ID-based Key Sharing Scheme
referred to as MK1.
In 1991, Maurer and Yacobi presented the similar scheme,
referred to as MY, which is similar to our scheme, MK1.
Unfortunately the schemes MK1 and MY are not secure,
In Dec.~1990, the present authors presented a secure ID-based key sharing scheme
referred to as MK2.
With a rapid progress of computer power for a last 15 years,
our proposed scheme would have more chance to be applied practically.
Regrettably, it is not widely known the fact that
(i) the schemes MY and MK1 are not secure,
(ii) there exists a secure scheme, MK2.
At this time, present authors review MK2
and clarify the difference between MK2 and other schemes from
the standpoint of security. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Discrete Logarithm Problem / Factoring Problem / ID-Based Cryptosystem / Key Sharing Scheme / Diffie-Hellman Public Key Distribution / DH Problem / Non-Interactive / |
Reference Info. |
IEICE Tech. Rep., vol. 105, no. 194, ISEC2005-44, pp. 9-16, July 2005. |
Paper # |
ISEC2005-44 |
Date of Issue |
2005-07-15 (ISEC) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
ISEC IPSJ-CSEC SITE |
Conference Date |
2005-07-21 - 2005-07-22 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Iwate Prefectural University |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
ISEC |
Conference Code |
2005-07-ISEC-IPSJ-CSEC-SITE |
Language |
English (Japanese title is available) |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Murakami-Kasahara ID-based Key Sharing Scheme Revisited |
Sub Title (in English) |
In Comparison With Maurer-Yacobi Scheme |
Keyword(1) |
Discrete Logarithm Problem |
Keyword(2) |
Factoring Problem |
Keyword(3) |
ID-Based Cryptosystem |
Keyword(4) |
Key Sharing Scheme |
Keyword(5) |
Diffie-Hellman Public Key Distribution |
Keyword(6) |
DH Problem |
Keyword(7) |
Non-Interactive |
Keyword(8) |
|
1st Author's Name |
Yasuyuki Murakami |
1st Author's Affiliation |
Osaka Electro-Communication University (Osaka Electro-Comm. Univ.) |
2nd Author's Name |
Masao Kasahara |
2nd Author's Affiliation |
Osaka Gakuin University (Osaka Gakuin Univ.) |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2005-07-22 09:55:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
ISEC2005-44 |
Volume (vol) |
vol.105 |
Number (no) |
no.194 |
Page |
pp.9-16 |
#Pages |
8 |
Date of Issue |
2005-07-15 (ISEC) |
|