Learn More
Recently, Sui et al. proposed two separable and anonymous ID-based key issuing protocols without secure channel and claimed that their second protocol avoids the key escrow problem. However, in this paper, impersonation attack is proposed to show that Sui et al.'s second protocol is not free from the key escrow problem. We also show that their protocol(More)
  • 1