Abstract
Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.
Original language | English |
---|---|
Pages (from-to) | 2702-2703 |
Number of pages | 2 |
Journal | IEICE Transactions on Communications |
Volume | E91-B |
Issue number | 8 |
DOIs | |
Publication status | Published - 2008 |
Keywords
- ID-based key distribution
- Impersonation
ASJC Scopus subject areas
- Software
- Computer Networks and Communications
- Electrical and Electronic Engineering