Cryptanalysis of an identity based broadcast encryption scheme without random oracles

被引:10
|
作者
Wang, Xu An [2 ]
Weng, Jian [1 ,3 ,4 ]
Yang, Xiaoyuan [2 ]
Yang, Yanjiang [5 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
[2] Engn Coll Chinese Armed Police Force, Key Lab Informat & Network Secur, Xian 710086, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[4] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China
[5] Inst Infocomm Res I2R, Singapore 119613, Singapore
基金
国家高技术研究发展计划(863计划); 美国国家科学基金会;
关键词
Cryptography; Identity based broadcast encryption; Chosen-ciphertext attack; Chosen-plaintext attack; CONSTANT-SIZE CIPHERTEXTS;
D O I
10.1016/j.ipl.2011.02.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity based broadcast encryption allows a centralized transmitter to send encrypted messages to a set of identities S, so that only the users with identity in S can decrypt these ciphertexts using their respective private key. Recently [Information Processing Letters 109 (2009)], an identity-based broadcast encryption scheme was proposed (Ren and Gu, 2009) [1], and it was claimed to be fully chosen-ciphertext secure without random oracles. However, by giving a concrete attack, we indicate that this scheme is even not chosen-plaintext secure. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:461 / 464
页数:4
相关论文
共 50 条
  • [31] Identity-based verifiably committed signature scheme without random oracles
    Xun Sun
    Jian-hua Li
    Gong-liang Chen
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 110 - 115
  • [32] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [33] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    [J]. INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [34] Cryptanalysis of RNZ, an identity-based fully anonymous broadcast encryption
    Mandal, Mriganka
    [J]. ICT EXPRESS, 2020, 6 (04): : 316 - 319
  • [35] Efficient selective-ID secure identity-based encryption without random oracles
    Boneh, D
    Boyen, X
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 223 - 238
  • [36] On the Security of an Improved Identity-based Proxy Signature Scheme without Random Oracles
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (07): : 2057 - 2068
  • [37] Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    Yu, Yong
    [J]. INFORMATICA, 2012, 23 (02) : 299 - 314
  • [38] Identity-based signcryption without random oracles
    Narayan, Shivaramakrishnan
    Udaya, Parampalli
    Lee, Peter Hyun-Jeen
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 342 - 347
  • [39] Identity-based identification without random oracles
    Kurosawa, K
    Heng, SH
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 603 - 613
  • [40] Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles
    Singh, Amit Kumar
    Acharya, Kamalesh
    Dutta, Ratna
    [J]. ANNALS OF TELECOMMUNICATIONS, 2023, 78 (1-2) : 79 - 90