Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
On Key Agreement and Conference Key Agreement
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Non-interactive public-key cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A remark on a non-interactive public-key distribution system
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Research note: Three ID-based information security functions
Computer Communications
New directions in cryptography
IEEE Transactions on Information Theory
Hi-index | 0.24 |
Recently, Lee and Chang proposed three ID-based information security functions that can be applied to the design of two authenticated key distribution schemes as well as three digital signature schemes (see Computer Communications 20 (14) (1997) 1301). They also claimed that security analyses of the proposed schemes are based on the difficulty of solving factorization, discrete logarithms modulo a composite, and the Diffie-Hellman problem. The authors will demonstrate several attacks on Lee and Chang's schemes, and show that all these schemes cannot fulfil the claimed security requirements.