The search functionality is under construction.

IEICE TRANSACTIONS on Information

Attacking Method on Tanaka's Scheme**

Kiyomichi ARAKI, Masato NAKAO

  • Full Text Views

    0

  • Cite this

Summary :

In this paper, we show a collusion attack on the novel and sophisticated ID-based non-interactive key sharing scheme proposed by Tanaka [2], [3]. It is based on a linear algebraic approach [4]. We discuss its complexity and provide numerical simulation results of the success probability in forging the shared keys.

Publication
IEICE TRANSACTIONS on Information Vol.E79-D No.3 pp.247-248
Publication Date
1996/03/25
Publicized
Online ISSN
DOI
Type of Manuscript
LETTER
Category
Information Security

Authors

Keyword