On the security of the Okamoto-Tanaka ID-based key exchange scheme againstactive attacks

Citation
S. Kim et al., On the security of the Okamoto-Tanaka ID-based key exchange scheme againstactive attacks, IEICE T FUN, E84A(1), 2001, pp. 231-238
Citations number
12
Categorie Soggetti
Eletrical & Eletronics Engineeing
Journal title
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
ISSN journal
09168508 → ACNP
Volume
E84A
Issue
1
Year of publication
2001
Pages
231 - 238
Database
ISI
SICI code
0916-8508(200101)E84A:1<231:OTSOTO>2.0.ZU;2-L
Abstract
As far as the knowledge of authors, the rigorous security of Okamoto-Tanaka identity-based key exchange scheme nas shown in [4] for the first time sin ce its invention. However, the analysis deals with only the passive attack. In this paper, we give several models of active attacks against the scheme and show the rigorous security of the scheme in these models. We prove sev eral relationships among attack models, including that (1) breaking the sch eme in one attack model is equivalent to breaking the RSA public-key crypto system and (2) breaking the scheme in another attack model is equivalent to breaking the Diffie-Hellman key exchange scheme over Z(n). The difference of the complexity stems from the difference of the timing of dishonest part y's sending out and receiving messages.