Examples of KGC in a sentence
However, in the cer- tificateless setting, the KGC does not know the users’ private keys.
As pointed out by the authors, the protocol is vulnerable to a man-in-the-middle attack if the KGC replaces both the short-term and long-term public keys exchanged in a proto- col run.
Here, Xi = xiP and Yi = xiP0 = xisP, where xi is an entity’s long-term secret value and s is the KGC master key.
If A and B then wish to establish a common secret key, they must run the protocol using each other’s KGC master public key.
Moreover, in our security model, an adversary armed with the KGC master key can no longer query for session-specific private information as it will reveal the established session key.
A minor drawback of this technique is that the public key must be generated before the private key is issued by the KGC.
Consequently, the KGC must be trusted not to replace entities’ public keys.
CL-PKC still makes use of a trusted authority, but in contrast to ID-PKC, the key gen- eration center (KGC) does not have access to the entities’ private keys.
The man-in-the-middle attack can only be mounted by the KGC or an adversary who has obtained the KGC master key.
The public key is generated in a similar way by letting the user combine its secret value with a public parameter selected by the KGC.