@inproceedings{c8b7568cb692456a9ef948e364ca22db,
title = "A note on the complexity of breaking okamoto-tanaka id-based key exchange scheme",
abstract = "The rigorous security of Okamoto-Tanaka identity-based key exchange scheme has been open for a decade. In this paper, we show that (1) breaking the scheme is equivalent to breaking the Diffie-Hellman key exchange scheme over Zn, and (2) impersonation is easier than breaking. The second result is obtained by proving that breaking the RSA public-key cryptosystem reduces to breaking the Diffie-Hellman scheme over Zn with respect to the polynomial-time many-one reducibility.",
author = "Masahiro Mambo and Hiroki Shizuya",
year = "1998",
month = jan,
day = "1",
doi = "10.1007/BFb0054031",
language = "English",
isbn = "3540646930",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag",
pages = "258--262",
editor = "Yuliang Zheng and Hideki Imai",
booktitle = "Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings",
note = "1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998 ; Conference date: 05-02-1998 Through 06-02-1998",
}