You are looking at a specific version 20050221:142650 of this paper. See the latest version.

Paper 2005/048

Cryptanalysis of two identification schemes based on an ID-based cryptosystem

Qiang Tang and Chris J. Mitchell

Abstract

Two identification schemes based on the Maurer-Yacobi ID-based cryptosystem are analysed and shown to suffer from serious security problems.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
qiang tang @ rhul ac uk
History
2005-02-21: received
Short URL
https://ia.cr/2005/048
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.