Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
JungYeon HWANG, Jongin LIM, DongHoon LEE, "Impersonation Attack on a Strong ID-Based Key Distribution" in IEICE TRANSACTIONS on Communications,
vol. E91-B, no. 8, pp. 2702-2703, August 2008, doi: 10.1093/ietcom/e91-b.8.2702.
Abstract: Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.
URL: https://global.ieice.org/en_transactions/communications/10.1093/ietcom/e91-b.8.2702/_p
Copy
@ARTICLE{e91-b_8_2702,
author={JungYeon HWANG, Jongin LIM, DongHoon LEE, },
journal={IEICE TRANSACTIONS on Communications},
title={Impersonation Attack on a Strong ID-Based Key Distribution},
year={2008},
volume={E91-B},
number={8},
pages={2702-2703},
abstract={Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.},
keywords={},
doi={10.1093/ietcom/e91-b.8.2702},
ISSN={1745-1345},
month={August},}
Copy
TY - JOUR
TI - Impersonation Attack on a Strong ID-Based Key Distribution
T2 - IEICE TRANSACTIONS on Communications
SP - 2702
EP - 2703
AU - JungYeon HWANG
AU - Jongin LIM
AU - DongHoon LEE
PY - 2008
DO - 10.1093/ietcom/e91-b.8.2702
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E91-B
IS - 8
JA - IEICE TRANSACTIONS on Communications
Y1 - August 2008
AB - Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.
ER -