Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme

被引:0
|
作者
Sun, Ying [1 ]
Yu, Yong [2 ]
Mu, Yi [3 ]
机构
[1] Sichuan Elect Power Res Inst, Chengdu 610072, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[3] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 新加坡国家研究基金会;
关键词
cryptanalysis; encryption; hierarchical identity-based cryptography;
D O I
10.1587/transinf.E95.D.1690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hu, Huang and Fan proposed a fully secure hierarchical identity-based encryption (IEICE Trans. Fundamentals, Vol.E92-A, No.6, pp.1494-1499,2009) that achieves constant size of ciphertext and tight security reduction. Unfortunately, Park and Lee (IEICE Trans. Fundamentals, Vol.E93-A, No.6, pp.1269-1272,2010) found that the security proof of Hu et al.'s scheme is incorrect; that is, the security of Hu et al.'s scheme cannot be reduced to their claimed q-ABDHE assumption. However, it is unclear whether Hu et al.'s scheme is still secure. In this letter, we provide an attack to show that the scheme is not secure against the chosen-plaintext attack.
引用
收藏
页码:1690 / 1693
页数:4
相关论文
共 50 条
  • [1] Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (06) : 1269 - 1273
  • [2] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [3] A new practical Limited identity-based encryption scheme
    Lu, Rongxing
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. FUNDAMENTA INFORMATICAE, 2007, 80 (04) : 461 - 474
  • [4] Hierarchical Identity-based Broadcast Encryption Scheme from LWE
    Yang, Chunli
    Zheng, Shihui
    Wang, Licheng
    Lu, Xiuhua
    Yang, Yixian
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (03) : 258 - 263
  • [5] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [6] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [7] Toward hierarchical identity-based encryption
    Horwitz, J
    Lynn, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 466 - 481
  • [8] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [9] On the Power of Hierarchical Identity-Based Encryption
    Mahmoody, Mohammad
    Mohammed, Ameer
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 243 - 272
  • [10] Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022