Attack on the Cryptographic Scheme NIKS-TAS

  • Don Coppersmith
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 839)


The NIKS-TAS scheme, proposed by Tsujii, Araki, and Sekine in 1993, is an ID-based cryptographic key sharing scheme. We present an algebraic method for attacking this scheme, requiring the cooperation of a small number of collaborators to discover the key shared by any two parties.


Hash Function Private Information Public Information Multiplicative Group Secret Information 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Trans. Informat. Theory, vol. IT-22, pp. 644–654, Nov. 1976.CrossRefMathSciNetGoogle Scholar
  2. 2.
    S. Tsujii, K. Araki, and T. Sekine, “A new scheme of non interactive ID-based key sharing with explosively high degree of separability (second version),” Technical report of Department of Computer Science, Tokyo Institute of Technology, 93TR-0020, July 1993.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  • Don Coppersmith
    • 1
  1. 1.T.J. Watson Research CenterIBM ResearchYorktown HeightsUSA

Personalised recommendations