Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme

被引:0
|
作者
Sun, Ying [1 ]
Yu, Yong [2 ]
Mu, Yi [3 ]
机构
[1] Sichuan Elect Power Res Inst, Chengdu 610072, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[3] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 新加坡国家研究基金会;
关键词
cryptanalysis; encryption; hierarchical identity-based cryptography;
D O I
10.1587/transinf.E95.D.1690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hu, Huang and Fan proposed a fully secure hierarchical identity-based encryption (IEICE Trans. Fundamentals, Vol.E92-A, No.6, pp.1494-1499,2009) that achieves constant size of ciphertext and tight security reduction. Unfortunately, Park and Lee (IEICE Trans. Fundamentals, Vol.E93-A, No.6, pp.1269-1272,2010) found that the security proof of Hu et al.'s scheme is incorrect; that is, the security of Hu et al.'s scheme cannot be reduced to their claimed q-ABDHE assumption. However, it is unclear whether Hu et al.'s scheme is still secure. In this letter, we provide an attack to show that the scheme is not secure against the chosen-plaintext attack.
引用
收藏
页码:1690 / 1693
页数:4
相关论文
共 50 条
  • [43] Generalized key delegation for hierarchical identity-based encryption
    Abdalla, Michel
    Kiltz, Eike
    Neven, Gregory
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 139 - 154
  • [44] Generalised key delegation for hierarchical identity-based encryption
    Abdalla, M.
    Kiltz, E.
    Neven, G.
    [J]. IET INFORMATION SECURITY, 2008, 2 (03) : 67 - 78
  • [45] Private Key Management in Hierarchical Identity-Based Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Guo, Fuchun
    [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212
  • [46] Unbounded Hierarchical Identity-based Encryption in the Standard Model
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    Yang, Yang
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (01): : 105 - 112
  • [47] Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 45 - 56
  • [48] Practical Identity-Based Encryption without random oracles
    Gentry, Craig
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 445 - 464
  • [49] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    [J]. INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [50] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919