Abstract
Koyama and Ohta proposed an identity based key distribution scheme. They considered three configurations: ring, complete graph, and star. The most practical configuration is the star which is used in teleconferencing. We show the Koyama-Ohta star scheme to be insecure. Specifically, we show that an active eavesdropper may cut one of the lines, and perform a bidirectional impersonation, thus establishing two separate keys. One with each side.
Cite
CITATION STYLE
Yacobi, Y. (1988). Attack on the koyama-ohta identity based key distribution scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 293 LNCS, pp. 429–433). Springer Verlag. https://doi.org/10.1007/3-540-48184-2_37
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.