Attack on the koyama-ohta identity based key distribution scheme

13Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Koyama and Ohta proposed an identity based key distribution scheme. They considered three configurations: ring, complete graph, and star. The most practical configuration is the star which is used in teleconferencing. We show the Koyama-Ohta star scheme to be insecure. Specifically, we show that an active eavesdropper may cut one of the lines, and perform a bidirectional impersonation, thus establishing two separate keys. One with each side.

Cite

CITATION STYLE

APA

Yacobi, Y. (1988). Attack on the koyama-ohta identity based key distribution scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 293 LNCS, pp. 429–433). Springer Verlag. https://doi.org/10.1007/3-540-48184-2_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free