Attribute-based encryption implies identity-based encryption

被引:11
|
作者
Herranz, Javier [1 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat, C Jordi Girona 1-3, ES-08034 Barcelona, Spain
关键词
public key cryptography; attribute-based encryption; collision-resistant hash function; discrete logarithm setting; Rivest-Shamir-Adleman setting; RSA setting; AND policies; secure identity-based encryption schemes; TRAPDOOR PERMUTATIONS;
D O I
10.1049/iet-ifs.2016.0490
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, they show how an attribute-based encryption scheme which admits, at least, policies can be combined with a collision-resistant hash function to obtain an identity-based encryption scheme. Even if this result may seem natural, not surprising at all, it has not been explicitly written anywhere, as far as they know. Furthermore, it may be an unknown result for some people: Odelu et al. in 2016 and 2017 have proposed both an attribute-based encryption scheme in the discrete logarithm setting, without bilinear pairings, and an attribute-based encryption scheme in the RSA setting, both admitting policies. If these schemes were secure, then by using the implication proved in this study, one would obtain secure identity-based encryption schemes in both the RSA and the discrete logarithm settings, without bilinear pairings, which would be a breakthrough in the area. Unfortunately, the author presents here complete attacks of the two schemes proposed by Odelu et al.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 50 条
  • [1] Puncturable identity-based and attribute-based encryption from lattices
    Dutta, Priyanka
    Susilo, Willy
    Dung Hoang Duong
    Roy, Partha Sarathi
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 929 : 18 - 38
  • [2] Provable Security Analysis on Unbounded Hierarchical Identity-based Encryption and Attribute-based Encryption
    Jiang, Yajun
    Du, Ming
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2016, : 510 - 513
  • [3] Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
    Tseng, Yi-Fan
    Fan, Chun-, I
    Lin, Chih-Wen
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 182 - 202
  • [4] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    [J]. Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [5] Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
    Kuchta, Veronika
    Sharma, Gaurav
    Sahu, Rajeev Anand
    Markowitch, Olivier
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 71 - 92
  • [6] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    [J]. Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [7] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [8] Identity-based Access Control for Digital Content based on Ciphertext-Policy Attribute-Based Encryption
    Huang, Win-Bin
    Su, Wei-Tsung
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 87 - 91
  • [9] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    [J]. Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936
  • [10] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554