Anda belum login :: 24 Nov 2024 09:58 WIB
Home
|
Logon
Hidden
»
Administration
»
Collection Detail
Detail
Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings
Oleh:
Jyh-Haw, Yeh
Jenis:
Article from Journal - ilmiah internasional
Dalam koleksi:
International Journal of Information and Education Technology vol. 03 no. 04 (Aug. 2013)
,
page 466-470.
Topik:
Public key cryptosystems
;
identity-based cryptosystems
;
cryptographic strong hash functions
;
bilinear pairings
Fulltext:
03_04_11_Jyh-Haw.pdf
(675.41KB)
Isi artikel
Many identity-based public key cryptosystems from bilinear pairings use hash functions to construct their public keys. Most of these schemes only specify the need of applying cryptographic strong or collision free hash functions, without giving any detail of which or what hash functions should be used. Traditional understanding of a cryptographic strong hash function has three security properties, which are pre-image resistance, second pre-image resistance and collision resistance. However, with only these three properties, in this paper we show a potential security vulnerability of identity-based cryptographic cryptosystems if the hash functions used are not correctly constructed. To fix this vulnerability, this paper defines an additional desirable security property for the hash functions in these identity-based cryptosystems.
Opini Anda
Klik untuk menuliskan opini Anda tentang koleksi ini!
Kembali
Process time: 0.015625 second(s)