Learn More
Recently, Sui et al. proposed two separable and anonymous IDbased key issuing protocols without secure channel and claimed that their second protocol avoids the key escrow problem. However, in this paper, impersonation attack is proposed to show that Sui et al.’s second protocol is not free from the key escrow problem. We also show that their protocol(More)
  • 1