PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity based encryption scheme based on the q-ABDHE problem with full security in the standard model. Later in Indocrypt’08, they proposed another secure hierarchical identity based encryption scheme based on the q-TBDHE problem with full security in the standard model. They claimed that their schemes have short parameters, high efficiency and tight reduction. However, in this paper we give attacks to show their schemes are not secure at all. Concretely, from any first level private key, the adversary can easily derive a “private key” which can decrypt any ciphertexts for the target identity. That is to say, a query on any first level identity is enough to decrypt any ciphertext in the system.
Wydawca
Rocznik
Strony
189--200
Opis fizyczny
Bibliogr. 16 poz.
Twórcy
autor
autor
autor
  • Key Laboratory of Information and Network Security, Engineering College of Chinese Armed Police Force, Xi’an, 710086, P. R. China, wangxahq@yahoo.com.cn
Bibliografia
  • [1] Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles, Advances in Cryptology - EUROCRYPT 2004 (C. Cachin, J. Camenisch, Eds.), 3027, Springer, Berlin, Germany, Interlaken, Switzerland, May 2-6, 2004.
  • [2] Boneh, D., Boyen, X.: Secure Identity Based EncryptionWithout Random Oracles, Advances in Cryptology - CRYPTO 2004 (M. Franklin, Ed.), 3152, Springer, Berlin, Germany, Santa Barbara, CA, USA, August 15-19, 2004.
  • [3] Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext, Advances in Cryptology - EUROCRYPT 2005 (R. Cramer, Ed.), 3494, Springer, Berlin, Germany, Aarhus, Denmark, May 22-26, 2005.
  • [4] Boneh, D., Franklin, M. K.: Identity-Based Encryption from the Weil Pairing, Advances in Cryptology - CRYPTO 2001 (J. Kilian, Ed.), 2139, Springer, Berlin, Germany, Santa Barbara, CA, USA, August 19-23, 2001.
  • [5] Canetti, R., Halevi, S., Katz, J.: A Forward-Secure Public-Key Encryption Scheme, Advances in Cryptology - EUROCRYPT 2003 (E. Biham, Ed.), 2656, Springer, Berlin, Germany,Warsaw, Poland, May 4-8, 2003.
  • [6] Canetti, R., Halevi, S., Katz, J.: A Forward-Secure Public-Key Encryption Scheme, Journal of Cryptology, 20(3), July 2007, 265-294.
  • [7] Gentry, C.: Practical Identity-Based EncryptionWithout Random Oracles, Advances in Cryptology - EUROCRYPT 2006 (S. Vaudenay, Ed.), 4004, Springer, Berlin, Germany, St. Petersburg, Russia, May 28 - June 1, 2006.
  • [8] Gentry, C., Halevi, S.: Hierarchical Identity Based Encryption with Polynomially Many Levels, TCC 2009: 6th Theory of Cryptography Conference (O. Reingold, Ed.), 5444, Springer, Berlin, Germany,March 15-17, 2009.
  • [9] Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography, Advances in Cryptology - ASIACRYPT 2002 (Y. Zheng, Ed.), 2501, Springer, Berlin, Germany, Queenstown, New Zealand, December 1-5, 2002.
  • [10] Horwitz, J., Lynn, B.: Toward Hierarchical Identity-Based Encryption, Advances in Cryptology - EUROCRYPT 2002 (L. R. Knudsen, Ed.), 2332, Springer, Berlin, Germany, Amsterdam, The Netherlands, April 28 - May 2, 2002.
  • [11] Lewko, A. B., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC 2010: 7th Theory of Cryptography Conference (D. Micciancio, Ed.), 5978, Springer, Berlin, Germany, Zurich, Switzerland, February 9-11, 2010.
  • [12] Ren, Y., Gu, D.: Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model, Informatica, 32(2), 2008, 207-211.
  • [13] Ren, Y., Gu, D.: Secure Hierarchical Identity Based Encryption Scheme in the Standard Model, Progress in Cryptology - INDOCRYPT 2008: 9th International Conference in Cryptology in India (D. R. Chowdhury, V. Rijmen, A. Das, Eds.), 5365, Springer, Berlin, Germany, Kharagpur, India, December 14-17, 2008.
  • [14] Shamir, A.: Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology - CRYPTO'84 (G. R. Blakley, D. Chaum, Eds.), 196, Springer, Berlin, Germany, Santa Barbara, CA, USA, August 19-23, 1985.
  • [15] Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, Advances in Cryptology - CRYPTO 2009 (S. Halevi, Ed.), 5677, Springer, Berlin, Germany, Santa Barbara, CA, USA, August 16-20, 2009.
  • [16] Waters, B. R.: Efficient Identity-Based Encryption Without Random Oracles, Advances in Cryptology - EUROCRYPT 2005 (R. Cramer, Ed.), 3494, Springer, Berlin, Germany, Aarhus, Denmark, May 22-26, 2005.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0018-0042
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.