Analysis of Hu-Huang-Fan practical hierarchical identity-Based encryption scheme

Jong Hwan Park, Dong Hoon Lee

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.

Original languageEnglish
Pages (from-to)1269-1273
Number of pages5
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE93-A
Issue number6
DOIs
Publication statusPublished - 2010 Jun 1

Fingerprint

Identity-based Encryption
Fans
Cryptography
Security Proof

Keywords

  • Bilinear maps
  • Full security
  • Hierarchical identity-based encryption

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Graphics and Computer-Aided Design
  • Applied Mathematics
  • Signal Processing

Cite this

@article{bfd106325ec24be981c6767718dd6ce5,
title = "Analysis of Hu-Huang-Fan practical hierarchical identity-Based encryption scheme",
abstract = "Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.",
keywords = "Bilinear maps, Full security, Hierarchical identity-based encryption",
author = "Park, {Jong Hwan} and Lee, {Dong Hoon}",
year = "2010",
month = "6",
day = "1",
doi = "10.1587/transfun.E93.A.1269",
language = "English",
volume = "E93-A",
pages = "1269--1273",
journal = "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",
issn = "0916-8508",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "6",

}

TY - JOUR

T1 - Analysis of Hu-Huang-Fan practical hierarchical identity-Based encryption scheme

AU - Park, Jong Hwan

AU - Lee, Dong Hoon

PY - 2010/6/1

Y1 - 2010/6/1

N2 - Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.

AB - Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.

KW - Bilinear maps

KW - Full security

KW - Hierarchical identity-based encryption

UR - http://www.scopus.com/inward/record.url?scp=77953192789&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77953192789&partnerID=8YFLogxK

U2 - 10.1587/transfun.E93.A.1269

DO - 10.1587/transfun.E93.A.1269

M3 - Article

AN - SCOPUS:77953192789

VL - E93-A

SP - 1269

EP - 1273

JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

SN - 0916-8508

IS - 6

ER -