Cryptology ePrint Archive: Report 2006/245

Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems

K. Phani Kumar and G. Shailaja and Ashutosh Saxena

Abstract: Key issuing protocols deal with overcoming the two inherent problems: key escrow and secure channel requirement of the identity based cryptosystems. An efficient key issuing protocol enables the identity based cryptosystems to be more acceptable and applicable in the real world. We present a secure and efficient threshold key issuing protocol. In our protocol, neither KGC nor KPA can impersonate the users to obtain the private keys and thus it achieves the trust level III \cite{girault}. The protocol is secure against replay, man-in-the-middle and insider attacks.

Category / Keywords: public-key cryptography / key escrow, threshold cryptography

Date: received 5 Jul 2006

Contact author: kpkumar at mtech idrbt ac in

Available format(s): PDF | BibTeX Citation

Version: 20060719:142126 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]