Abstract
Koyama and Ohta proposed an identity based key distribution scheme. They considered three configurations: ring, complete graph, and star. The most practical configuration is the star which is used in teleconferencing. We show the Koyama-Ohta star scheme to be insecure. Specifically, we show that an active eavesdropper may cut one of the lines, and perform a bidirectional impersonation, thus establishing two separate keys. One with each side.
Chapter PDF
Similar content being viewed by others
Refernces
K. Koyama and K. Ohta:“Identity based conference key distribution systems”, To appear in the proceedings of Crypto-87
Diffie and Hellman: “New Directions in Cryptography”, IEEE Trans. on Inf. Th., 1976.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yacobi, Y. (1988). Attack on the Koyama-Ohta Identity Based Key Distribution Scheme. In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_37
Download citation
DOI: https://doi.org/10.1007/3-540-48184-2_37
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18796-7
Online ISBN: 978-3-540-48184-3
eBook Packages: Springer Book Archive