A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Hi-index | 0.00 |
It has been pointed out that the Shieh-Yang-Sun ID-based authentication and key distribution protocol is vulnerable to the replay attack and the unknown key share attack. We further demonstrate that the protocol is vulnerable to the forgery attack, too. In addition, we describe an improved protocol that has better resistance ability to these attacks.