Indexed by:
Abstract:
In 2005, Sui et al. proposed two separable and anonymous identity-based key issuing schemes, but the impersonation attack is proposed to show that Sui et al.'s second protocol is not free from the key-escrow problem. In order to solve such problem, Feng Cao et al. proposed an improved scheme in 2006. However, in the paper, we find that Feng Cao et al.'s scheme is still vulnerable to the impersonation attack. According, the current paper first shows the weakness of Feng Cao et al's improved scheme, and then proposes our improvement which reaches the goal of avoiding key escrow problem and enhances efficiency. © 2008 IEEE.
Keyword:
Reprint Author's Address:
Email:
Source :
Year: 2008
Language: English
Cited Count:
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 7
Affiliated Colleges: