Cryptology ePrint Archive: Report 2006/245
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems
K. Phani Kumar and G. Shailaja and Ashutosh Saxena
Abstract: Key issuing protocols deal with overcoming the two inherent
problems: key escrow and secure channel requirement of the
identity based cryptosystems. An efficient key issuing protocol
enables the identity based cryptosystems to be more acceptable and
applicable in the real world. We present a secure and efficient
threshold key issuing protocol. In our protocol, neither KGC nor
KPA can impersonate the users to obtain the private keys and thus
it achieves the trust level III \cite{girault}. The protocol is
secure against replay, man-in-the-middle and insider attacks.
Category / Keywords: public-key cryptography / key escrow, threshold cryptography
Date: received 5 Jul 2006
Contact author: kpkumar at mtech idrbt ac in
Available format(s): PDF | BibTeX Citation
Version: 20060719:142126 (All versions of this report)
Short URL: ia.cr/2006/245
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]