• May 03, 2016 News! IJIET Vol. 5, No. 10 has been indexed by EI (Inspec).   [Click]
  • Mar 13, 2017 News!Vol. 7, No. 5 has been indexed by Crossref.
  • Mar 10, 2017 News!Vol. 7, No. 5 issue has been published online!   [Click]
General Information
    • ISSN: 2010-3689
    • Frequency: Bimonthly (2011-2014); Monthly (Since 2015)
    • DOI: 10.18178/IJIET
    • Editor-in-Chief: Prof. Dr. Steve Thatcher
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: EI (INSPEC, IET), Electronic Journals Library, Google Scholar, Crossref and ProQuest
    • E-mail: ijiet@ejournal.net
Editor-in-chief
Prof. Dr. Steve Thatcher
University of South Australia, Australia
It is my honor to be the editor-in-chief of IJIET. The journal publishes good papers which focous on the advanced researches in the field of information and education technology. Hopefully, IJIET will become a recognized journal among the scholars in the filed of information and education technology.
IJIET 2013 Vol.3(4): 466-470 ISSN: 2010-3689
DOI: 10.7763/IJIET.2013.V3.319

Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings

Jyh-Haw Yeh
Abstract—Many identity-based public key cryptosystems from bilinear pairings use hash functions to construct their public keys. Most of these schemes only specify the need of applying cryptographic strong or collision free hash functions, without giving any detail of which or what hash functions should be used. Traditional understanding of a cryptographic strong hash function has three security properties, which are pre-image resistance, second pre-image resistance and collision resistance. However, with only these three properties, in this paper we show a potential security vulnerability of identity-based cryptographic cryptosystems if the hash functions used are not correctly constructed. To fix this vulnerability, this paper defines an additional desirable security property for the hash functions in these identity-based cryptosystems.

Index Terms—Public key cryptosystems, identity-based cryptosystems, cryptographic strong hash functions, bilinear pairings.

Jyh-Haw Yeh is with the Department of Computer Science, Boise State University, Boise, ID 83725, USA (e-mail: jhyeh@ boisestate.edu).

[PDF]

Cite:Jyh-Haw Yeh, "Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings," International Journal of Information and Education Technology vol. 3, no. 4, pp. 466-470, 2013.

Copyright © 2008-2016. International Journal of Information and Education Technology. All rights reserved.
E-mail: ijiet@ejournal.net