The search functionality is under construction.
The search functionality is under construction.

Impersonation Attack on a Strong ID-Based Key Distribution

JungYeon HWANG, Jongin LIM, DongHoon LEE

  • Full Text Views

    0

  • Cite this

Summary :

Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.

Publication
IEICE TRANSACTIONS on Communications Vol.E91-B No.8 pp.2702-2703
Publication Date
2008/08/01
Publicized
Online ISSN
1745-1345
DOI
10.1093/ietcom/e91-b.8.2702
Type of Manuscript
LETTER
Category
Fundamental Theories for Communications

Authors

Keyword