Security vulnerability in a non-interactive ID-based proxy re-encryption scheme

Woo Kwon Koo, Jung Yeon Hwang, Dong Hoon Lee

Research output: Contribution to journalArticle

9 Citations (Scopus)

Abstract

Recently, a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest user's private key and thereby decrypt ciphertexts intended for the honest user.

Original languageEnglish
Pages (from-to)1260-1262
Number of pages3
JournalInformation Processing Letters
Volume109
Issue number23-24
DOIs
Publication statusPublished - 2009 Nov 15

Keywords

  • CCA-security
  • Collusion attack
  • Cryptography
  • Identity-based proxy re-encryption

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Signal Processing
  • Information Systems
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Security vulnerability in a non-interactive ID-based proxy re-encryption scheme'. Together they form a unique fingerprint.

  • Cite this