Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model

被引:0
|
作者
Wang, Xu An [1 ]
Yang, Xiaoyuan [1 ]
Zhang, Minqing [1 ]
Yu, Yong [2 ]
机构
[1] Univ Chinese Armed Police Force, Key Lab Informat & Network Secur Engn, Xian 710086, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; fuzzy identity based encryption; fully secure; CCA2-secure; attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fuzzy identity based encryption (FIBE), proposed by Sahai and Waters, is a new kind of identity based encryption. It allows users with identity w can decrypt ciphertext for w' if and only if w is close enough to w'. Recently, Ren et al. proposed a new FIBE scheme and claimed it is fully CCA2 secure in the standard model with a tight reduction. However, in this paper we will show that their scheme is not correct. Furthermore, the key generation process of their scheme cannot resist the collusion attack, which is a basic security requirement for FIBE. At last, we propose a new fully secure FIBE scheme based on the Sahai Waters FIBE scheme and prove its security by using the "dual system encryption" technique.
引用
收藏
页码:299 / 314
页数:16
相关论文
共 50 条
  • [1] Cryptanalysis of an identity based signcryption scheme in the standard model
    Ming, Yang
    Wang, Yumin
    International Journal of Network Security, 2016, 18 (01) : 165 - 171
  • [2] An improved identity based encryption scheme in the standard model
    Xu, Shiyou
    Li, Xiao
    He, Mingxing
    Journal of Information and Computational Science, 2011, 8 (15): : 3437 - 3444
  • [3] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Cheng, Lin
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (01) : 163 - 173
  • [4] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Lin Cheng
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Frontiers of Computer Science, 2014, 8 : 163 - 173
  • [5] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Lin CHENG
    Qiaoyan WEN
    Zhengping JIN
    Hua ZHANG
    Frontiers of Computer Science, 2014, 8 (01) : 163 - 173
  • [6] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [7] Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model
    Ren, Yanli
    Gu, Dawu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (02): : 207 - 211
  • [8] Efficient hierarchical identity based encryption scheme in the standard model
    Ren, Yanli
    Gu, Dawu
    Informatica (Ljubljana), 2008, 32 (02) : 207 - 211
  • [9] Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
    Ren, Yanli
    Gu, Dawu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 104 - 115
  • [10] New Fuzzy Identity-Based Encryption in the Standard Model
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpeng
    INFORMATICA, 2010, 21 (03) : 393 - 407