Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
スポンサーリンク
概要
- 論文の詳細を見る
Hu, Huang and Fan proposed a fully secure hierarchical identity-based encryption (IEICE Trans. Fundamentals, Vol.E92-A, No.6, pp.1494-1499, 2009) that achieves constant size of ciphertext and tight security reduction. Unfortunately, Park and Lee (IEICE Trans. Fundamentals, Vol.E93-A, No.6, pp.1269-1272, 2010) found that the security proof of Hu et al.'s scheme is incorrect; that is, the security of Hu et al.'s scheme cannot be reduced to their claimed q-ABDHE assumption. However, it is unclear whether Hu et al.'s scheme is still secure. In this letter, we provide an attack to show that the scheme is not secure against the chosen-plaintext attack.
- 2012-06-01
著者
-
Yu Yong
School Of Computer Science And Engineering University Of Electronic Science And Technology Of China
-
YU Yong
School of Computer Science and Engineering, University of Electronic Science and Technology of China
-
SUN Ying
Sichuan Electric Power Research Institute
-
MU Yi
Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong
関連論文
- Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings
- Sensor-based probabilistic roadmaps: experiments with an eye-in-hand system
- Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
- Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
- On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model