Impersonation attack on a strong ID-based key distribution

Jung Yeon Hwang, Jongin Lim, Donghoon Lee

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)


Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user.

Original languageEnglish
Pages (from-to)2702-2703
Number of pages2
JournalIEICE Transactions on Communications
Issue number8
Publication statusPublished - 2008


  • ID-based key distribution
  • Impersonation

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this