Cryptanalysis of an identity based broadcast encryption scheme without random oracles

被引:10
|
作者
Wang, Xu An [2 ]
Weng, Jian [1 ,3 ,4 ]
Yang, Xiaoyuan [2 ]
Yang, Yanjiang [5 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
[2] Engn Coll Chinese Armed Police Force, Key Lab Informat & Network Secur, Xian 710086, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[4] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China
[5] Inst Infocomm Res I2R, Singapore 119613, Singapore
基金
国家高技术研究发展计划(863计划); 美国国家科学基金会;
关键词
Cryptography; Identity based broadcast encryption; Chosen-ciphertext attack; Chosen-plaintext attack; CONSTANT-SIZE CIPHERTEXTS;
D O I
10.1016/j.ipl.2011.02.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity based broadcast encryption allows a centralized transmitter to send encrypted messages to a set of identities S, so that only the users with identity in S can decrypt these ciphertexts using their respective private key. Recently [Information Processing Letters 109 (2009)], an identity-based broadcast encryption scheme was proposed (Ren and Gu, 2009) [1], and it was claimed to be fully chosen-ciphertext secure without random oracles. However, by giving a concrete attack, we indicate that this scheme is even not chosen-plaintext secure. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:461 / 464
页数:4
相关论文
共 50 条
  • [1] Efficient Identity-based Broadcast Encryption without Random Oracles
    Hu, Liang
    Liu, Zheli
    Cheng, Xiaochun
    [J]. JOURNAL OF COMPUTERS, 2010, 5 (03) : 331 - 336
  • [2] New Constructions of Identity-based Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (02): : 428 - 439
  • [3] Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles
    Xie Li
    Ren Yanli
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (02) : 40 - 51
  • [4] Practical Hierarchical Identity Based Encryption Scheme without Random Oracles
    Hu, Xiaoming
    Huang, Shangteng
    Fan, Xun
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (06) : 1494 - 1499
  • [5] Cryptanalysis of an Identity Based Signcryption without Random Oracles
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    [J]. FUNDAMENTA INFORMATICAE, 2011, 107 (01) : 105 - 109
  • [6] Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 347 - +
  • [7] Secure identity based encryption without random oracles
    Boneh, D
    Boyen, X
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 443 - 459
  • [8] Fully CCA2 secure identity based broadcast encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    [J]. INFORMATION PROCESSING LETTERS, 2009, 109 (11) : 527 - 533
  • [9] Practical Identity-Based Encryption without random oracles
    Gentry, Craig
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 445 - 464
  • [10] Identity-Based Matchmaking Encryption Without Random Oracles
    Francati, Danilo
    Guidi, Alessio
    Russo, Luigi
    Venturi, Daniele
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 415 - 435