Impersonation attack on a strong ID-based key distribution

Jung Yeon Hwang, Jong In Lim, Dong Hoon Lee

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.

Original languageEnglish
Pages (from-to)2702-2703
Number of pages2
JournalIEICE Transactions on Communications
VolumeE91-B
Issue number8
DOIs
Publication statusPublished - 2008 Dec 1

Keywords

  • ID-based key distribution
  • Impersonation

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Software

Cite this

Impersonation attack on a strong ID-based key distribution. / Hwang, Jung Yeon; Lim, Jong In; Lee, Dong Hoon.

In: IEICE Transactions on Communications, Vol. E91-B, No. 8, 01.12.2008, p. 2702-2703.

Research output: Contribution to journalArticle

@article{28d05a2b169240b7a5b47a6858cec021,
title = "Impersonation attack on a strong ID-based key distribution",
abstract = "Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.",
keywords = "ID-based key distribution, Impersonation",
author = "Hwang, {Jung Yeon} and Lim, {Jong In} and Lee, {Dong Hoon}",
year = "2008",
month = "12",
day = "1",
doi = "10.1093/ietcom/e91-b.8.2702",
language = "English",
volume = "E91-B",
pages = "2702--2703",
journal = "IEICE Transactions on Communications",
issn = "0916-8516",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "8",

}

TY - JOUR

T1 - Impersonation attack on a strong ID-based key distribution

AU - Hwang, Jung Yeon

AU - Lim, Jong In

AU - Lee, Dong Hoon

PY - 2008/12/1

Y1 - 2008/12/1

N2 - Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.

AB - Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.

KW - ID-based key distribution

KW - Impersonation

UR - http://www.scopus.com/inward/record.url?scp=67651021989&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=67651021989&partnerID=8YFLogxK

U2 - 10.1093/ietcom/e91-b.8.2702

DO - 10.1093/ietcom/e91-b.8.2702

M3 - Article

AN - SCOPUS:67651021989

VL - E91-B

SP - 2702

EP - 2703

JO - IEICE Transactions on Communications

JF - IEICE Transactions on Communications

SN - 0916-8516

IS - 8

ER -