On the security of Luo et al.'s fully secure hierarchical identity based encryption scheme

Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Recently, Luo et al. proposed an efficient hierarchical identity based encryption (HIBE) scheme with constant size of ciphertexts, and proved its full security under standard assumptions. To construct the scheme, they used the dual system encryption technique of Waters, and devised a method that compresses the tag values of dual system encryption. In this paper, we show that the security proof of Luo et al. is wrong since there exists an algorithm that distinguishes whether it is a simulation or not.

Original languageEnglish
Pages (from-to)1631-1636
Number of pages6
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE95-A
Issue number9
DOIs
Publication statusPublished - 2012 Sep 1

Fingerprint

Identity-based Encryption
Encryption
Cryptography
Security Proof
Water
Simulation
Standards

Keywords

  • Bilinear pairing
  • Full security
  • Hierarchical identity based encryption

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Graphics and Computer-Aided Design
  • Applied Mathematics
  • Signal Processing

Cite this

On the security of Luo et al.'s fully secure hierarchical identity based encryption scheme. / Lee, Kwangsu; Park, Jong Hwan; Lee, Dong Hoon.

In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E95-A, No. 9, 01.09.2012, p. 1631-1636.

Research output: Contribution to journalArticle

@article{c5a4b3b816f04888beb7d4883cefe208,
title = "On the security of Luo et al.'s fully secure hierarchical identity based encryption scheme",
abstract = "Recently, Luo et al. proposed an efficient hierarchical identity based encryption (HIBE) scheme with constant size of ciphertexts, and proved its full security under standard assumptions. To construct the scheme, they used the dual system encryption technique of Waters, and devised a method that compresses the tag values of dual system encryption. In this paper, we show that the security proof of Luo et al. is wrong since there exists an algorithm that distinguishes whether it is a simulation or not.",
keywords = "Bilinear pairing, Full security, Hierarchical identity based encryption",
author = "Kwangsu Lee and Park, {Jong Hwan} and Lee, {Dong Hoon}",
year = "2012",
month = "9",
day = "1",
doi = "10.1587/transfun.E95.A.1631",
language = "English",
volume = "E95-A",
pages = "1631--1636",
journal = "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",
issn = "0916-8508",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "9",

}

TY - JOUR

T1 - On the security of Luo et al.'s fully secure hierarchical identity based encryption scheme

AU - Lee, Kwangsu

AU - Park, Jong Hwan

AU - Lee, Dong Hoon

PY - 2012/9/1

Y1 - 2012/9/1

N2 - Recently, Luo et al. proposed an efficient hierarchical identity based encryption (HIBE) scheme with constant size of ciphertexts, and proved its full security under standard assumptions. To construct the scheme, they used the dual system encryption technique of Waters, and devised a method that compresses the tag values of dual system encryption. In this paper, we show that the security proof of Luo et al. is wrong since there exists an algorithm that distinguishes whether it is a simulation or not.

AB - Recently, Luo et al. proposed an efficient hierarchical identity based encryption (HIBE) scheme with constant size of ciphertexts, and proved its full security under standard assumptions. To construct the scheme, they used the dual system encryption technique of Waters, and devised a method that compresses the tag values of dual system encryption. In this paper, we show that the security proof of Luo et al. is wrong since there exists an algorithm that distinguishes whether it is a simulation or not.

KW - Bilinear pairing

KW - Full security

KW - Hierarchical identity based encryption

UR - http://www.scopus.com/inward/record.url?scp=84865743096&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84865743096&partnerID=8YFLogxK

U2 - 10.1587/transfun.E95.A.1631

DO - 10.1587/transfun.E95.A.1631

M3 - Article

AN - SCOPUS:84865743096

VL - E95-A

SP - 1631

EP - 1636

JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

SN - 0916-8508

IS - 9

ER -