PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

On the Insecurity of an Identity Based Proxy Re-encryption Scheme

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
At Pairing'07, Matsuo proposed two proxy re-encryption schemes: proxy re-encryption fromCBE to IBE and IBE to IBE. Now both schemes have been standardized by P1363.3workgroup. In this paper, we show that their identity based proxy re-encryption scheme is insecure. We give two attacks to this scheme. The first attack shows that the proxy can re-encrypt any IBE user's ciphertext to be the delegatee's ciphertext. The second attack implies that, if the proxy colludes with any delegatee, the proxy and this delegatee can derive any other IBE user’s secret key.
Wydawca
Rocznik
Strony
277--281
Opis fizyczny
Bibliogr. 9 poz.
Twórcy
autor
autor
  • Key Laboratory of Information and Network Security, Engineering College of Chinese Armed Police Force, Xi’an, 710086, P. R. China, wangxahq@yahoo.com.cn
Bibliografia
  • [1] Ateniese, G., Fu, K., Green,M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage, NDSS, The Internet Society, 2005, ISBN 1-891562-20-7, 1-891562-19-3.
  • [2] Ateniese, G., Fu, K., Green,M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Trans. Inf. Syst. Secur., 9(1), 2006, 1 -30.
  • [3] Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography, EUROCRYPT (K. Nyberg, Ed.), 1403, Springer, 1998, ISBN 3-540-64518-7.
  • [4] Boneh, D., Boyen, X.: Efficient selective-id secure identity based encryption without random oracles, EUROCRYPT (C. Cachin, J. Camenisch, Eds.), 3027, Springer, 2004, ISBN 3-540-21935-8.
  • [5] Boneh, D., Goh, E., Matsuo, T.: Proposal for P1363.3 proxy re-encryption, Sep 2006, Available online at http://grouper.ieee.org/groups/1363/IBC/submissions/.
  • [6] Goh, E., Matsuo, T.: Proposal for P1363.3 proxy re-encryption, Aug 2006, Available online at http://grouper.ieee.org/groups/1363/IBC/submissions/.
  • [7] Green, M., Ateniese, G.: Identity-based proxy re-encryption, ACNS (J. Katz, M. Yung, Eds.), 4521, Springer, 2007, ISBN 978-3-540-72737-8.
  • [8] Martin, L.: P1363.3(TM)/D1,Draft standard for identity-based public cryptography using pairings, may 2008.
  • [9] Matsuo, T.: Proxy re-encryption systems for identity-based encryption, Pairing (T. Takagi, T. Okamoto, E. Okamoto, T. Okamoto, Eds.), 4575, Springer, 2007, ISBN 978-3-540-73488-8
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0010-0015
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.